Clickjacking is a type of cyber attack wherein the perpetrator tricks website visitors into unintentionally clicking a page element or link disguised to lead to a non-malicious page when it actually does otherwise.
The attacker typically cloaks a page element (say, an invisible box) using a so-called “iframe.” Iframe is short for “invisible frame.” The malicious item sits on top, so it gets clicked instead of an image or hyperlink behind it. If we look under the hood, a link to the attacker’s page is located in the top frame, while the image or site link the victim thinks he/she is accessing is in the sub-frame.
Offenders also conceal links using uniform resource locator (URL) shorteners. In this case, the shortened form of the link hides the malicious URL. As a result, users get taken to a different destination from what they initially saw in the link preview.
If we were to draw an analogy, clickjacking is comparable to receiving a majestically wrapped present. But when you tear off the wrapping, you’ll only find an underwhelming item inside.
Read More about “Clickjacking”
Threat actors may have varying motives for clickjacking attacks. Some redirect users to sites that they control to harvest credentials or install malware on victims’ computers. The reason can also be as superficial as stealing clicks or sessions meant for a video, website article, or popular social media post.
Forms of Clickjacking
Clickjacking comes in other forms, which include:
Likejacking occurs when a user ends up liking a Facebook page he/she did not intend to follow. This form of clickjacking uses a malicious code or widget, which hides Like buttons throughout a web page. Spam websites are often guilty of this act. However, some legitimate businesses do this as well to inflate their follower count.
Also known as “pointerjacking,” cursorjacking deceives users through a customized mouse pointer image. In this attack, the cursor appears to move to a different position from where the user initially placed it on the page. The threat actor “drags” a user’s cursor to strategic places across the page, causing them to end up accidentally clicking a malicious link or element.
Clickjacking is similar to Domain Name System (DNS) redirection attacks as the payload is delivered in the same manner. The only difference is that clickjacking occurs on the user interface (hence its other name, “UI redress attack”), while DNS attacks target vulnerable DNS records.
How can Users Avoid Becoming a Clickjacking Victim?
Another way to prevent clickjacking is by implementing X-Frame-Options (XFO), a HyperText Transfer Protocol (HTTP) response header that instructs a browser how to render your content. It also effectively prevents other sites from presenting your content.
Web Application Firewall
Users can also rely on a web application firewall (WAF) to prevent clickjacking. A WAF analyzes and automatically blocks HTTP traffic coming from domains that are trying to load your resources on their page.