{"id":14876,"date":"2023-11-20T14:19:56","date_gmt":"2023-11-20T14:19:56","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=14876"},"modified":"2023-11-20T14:19:58","modified_gmt":"2023-11-20T14:19:58","slug":"clickjacking-what-is-it-how-does-it-work","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/cyber-security\/clickjacking-what-is-it-how-does-it-work\/","title":{"rendered":"Clickjacking: What Is It & How Does It Work?","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"

Clickjacking is a type of attack that tricks a user into clicking a website element that is either invisible or disguised as another element. This hijacks a user\u2019s click meant for one thing but leads to another. <\/p>

For example: instead of clicking a button to reply, a clickjacking attack on a Twitter user can make them re-tweet a malicious domain to followers instead. This is typically seen as a browser security issue. However, such an attack can also take place in mobile applications.<\/p>

Understanding the concept of clickjacking<\/strong><\/span><\/h2>

Clickjacking is\u00a0an attack that tricks users into thinking they are clicking on one thing when in fact, they are clicking on something else. Essentially, unsuspecting users believe they are using a web page\u2019s usual user interface when in reality, attackers have imposed a hidden user interface instead. <\/p>

When users click on buttons they think are safe, the hidden user interface performs a different action. This can cause users to inadvertently download\u00a0malware, provide credentials or sensitive information, visit malicious web pages, transfer money, or purchase products online.<\/p>

There are different variations of clickjacking attacks and because of that, the terms \u2018user interface (UI) redressing\u2019 or \u2018UI redress attacks\u2019 are often used to encompass different variations.<\/p>

Also known as a user redress interface attack, the term clickjacking was coined by Jeremiah Grossman and Robert Hansen in 2008.<\/p>

While clickjacking might seem like spoofing\u2014in which the cyber attacker recreates websites or landing pages to trick users into thinking the fake pages are the original, legitimate pages\u2014it is much more sophisticated. The website the victim is looking at in a clickjacking scheme is the real website of a known, trusted entity. <\/p>

However, the attacker has added an invisible overlay over its content using various HTML technologies, including custom cascading style sheets (CSS) and iframe, which allow for content from other websites to be ported onto another website.<\/p>

How clickjacking works<\/strong><\/h2>

Clickjacking is possible because of HTML frames or iframes \u2013 i.e., the ability to display web pages within other web pages through frames. Essentially, an iframe is a frame within a frame. Iframes enable you to embed content from other sources onto your web pages. <\/p>

For example, when you visit a website that has an embedded YouTube video displayed, that video exists within an iframe. This creates a clickjacking e. If a web page can be displayed within a frame, attackers can cover the original web page with a hidden, transparent layer with its own JavaScript and UI elements. The outward appearance of the web page remains unchanged, which means users have no reason to suspect anything might be amiss.<\/p>

Users then navigate the web page, expecting links and buttons to work normally. But the hidden UI means the attacker\u2019s script works instead. The attacker\u2019s script can work behind the scenes to make it appear as though nothing is wrong. This makes a range of malicious actions possible, including:<\/p>