Get a free application, infrastructure and malware scan report - Scan Your Website Now

Subscribe to our Newsletter
Try AppTrana WAAP (WAF)
Managed WAF Start at $99

What is Clickjacking?

Posted DateNovember 19, 2018
Posted Time 3   min Read

The internet and technology have revolutionized not just our lives but those of cyber-criminals as well. They have also been leveraging the advent of technology to find new and innovative ways to orchestrate hacks, malicious attacks, breaches, and so on. Adding to the long list of cyber-attacks such as online scams, SQL Injections, DDoS attacks, phishing, etc. aimed at trapping unsuspecting victims is clickjacking. So, let us delve deeper into what clickjacking is all about and how to secure one’s clients/customers/users from it.

Introduction to Clickjacking

Most of us would know how a hijacking happens, either from the news or the movies. Unsuspecting victims board their flight to land at their chosen destination. But mid-air, armed attackers take over or hijack the flight to accomplish their objectives by using the innocent co-passengers as pawns. Clickjacking is similar to hijacking; the flight, in this case, are the clicks, the hijackers are cyber-criminals and hackers and the mission is to hijack the click made on a specific page by the unsuspecting victim to another page in order to steal their credentials or finances or other such malicious goals.

Technically speaking, clickjacking is also known as the UI redress attack. It is the kind of cyber-attack where the attackers take advantage of a vulnerability in the UI or webpage to edit it and add multiple transparent and opaque layers over it in such a manner that it looks like a legitimate website or webpage. However, when the user clicks on specific links or buttons on the page, their click is hijacked, and they are routed to and are interacting with a completely different website. Clickjacking is one of the easiest cyber-attacks to orchestrate and quite passive, but their intent is malicious and impact is heavy.

For example- A cyber-attacker has placed a free iPhone button on a webpage and layered a webpage you use on top of it. He has linked the free iPhone button to the fund transfer button in your bank account and when you click on this button, you are basically transferring funds to him without your knowledge.

Reasons/Motivations for Clickjacking attacks

Clickjacking attacks occur for 3 major reasons:

  1. Getting users to download malware.
  2. Gaining control over a computer or mobile device.
  3. Gaining access to peripheral hardware.
  4. Getting users to post/like/publish/follow pages, groups, etc. on social media platforms without the knowledge.

Modus operandi of such attacks

The common strategies used or modus operandi of cyber-criminals to carry out clickjacking attacks are the following.

  • Vulnerable applications: When there are vulnerabilities in the application itself such as with the Adobe Flash Player plug-in, the attackers can gain access to the hardware attached such as the camera and microphone.
  • Transparent pages: As discussed earlier, the cyber-attacker uses vulnerabilities on the browser to embed a page that is already authenticated by the user to a malicious web page controlled by him/her. So, the attacker can selectively make some parts of the original application invisible and show the user only controlled elements like form fields, buttons, and tabs that they want the user to click.
  • JavaScript button: When only HTML is used, some functionalities may not be possible. So, by using JavaScript instead of the only HTML, the cyber-criminals can manipulate the User Interface (UI) in myriad ways. For instance- placing a button under the user’s cursor at all times by embedding a malicious webpage on the browser so that the users are forced to make the click.
  • iFrame Overlay: The malicious website of the attacker contains 2 parts: a code to generate fake UI and an iFrame overlay to cover a portion of the legitimate application. The cyber-criminal can make the user believe that they are using a legitimate web application by using these iFrame overlays and trick them into taking any desired action.

How to Prevent Clickjacking Attacks?

Even though clickjacking may seem like irrelevant, juvenile, or passive occurrences, they are not; they are malicious in intent and impact. So, you must strive towards the prevention of such attacks to ensure that you do not lose money, customers, and brand value.

You must ensure that your web applications are secure from vulnerabilities so that they do not allow third-parties to meddle with them. Choose an intelligent, round-the-clock, managed WAF like AppTrana that will act as your application’s wall of defense preventing malicious requests from accessing it through loopholes/vulnerabilities while also immediately patching vulnerabilities till developer fix them. It continuously monitors for threats, allows custom rules, and assures zero false positives.

The other measure to take to prevent clickjacking attacks is to include X-Frame-Options HTTP headers which will ensure that your web application or its resources are not being loaded in frames or iFrames on other pages or domains.

Stay tuned for more relevant and interesting security articles. Follow Indusface on FacebookTwitter, and LinkedIn.

web application security banner

Spread the love

Join 47000+ Security Leaders

Get weekly tips on blocking ransomware, DDoS and bot attacks and Zero-day threats.

We're committed to your privacy. indusface uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Related Posts

Clickjacking Attacks
What are Clickjacking Attacks? Tips to Prevent Them

Clickjacking attacks affect users and only businesses can protect them through robust clickjacking prevention measures.

Spread the love

Read More

AppTrana

Fully Managed SaaS-Based Web Application Security Solution

Get free access to Integrated Application Scanner, Web Application Firewall, DDoS & Bot Mitigation, and CDN for 14 days

Know More Take Free Trial

Gartner

Indusface is the only cloud WAAP (WAF) vendor with 100% Customer Recommendation for 3 consecutive years.

A Customers’ Choice for 2022 and 2023 - Gartner® Peer Insights™

The reviews and ratings are in!