Preferences

Privacy is important to us, so you have the option of disabling certain types of storage that may not be necessary for the basic functioning of the website. Blocking categories may impact your experience on the website. More information

Accept all cookiesClose button

These items are required to enable basic website functionality.

Always active

These items are used to deliver advertising that is more relevant to you and your interests.

These items allow the website to remember choices you make (such as your user name, language, or the region you are in) and provide enhanced, more personal features.

These items help the website operator understand how its website performs, how visitors interact with the site, and whether there may be technical issues.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Cookies

New Cyber Threat: Beware of Double-Clicking

6.1.2025
Users of web browsers like Chrome, Edge, and Safari face a new and dangerous attack method—double clickjacking. This technique allows hackers to exploit mouse double-clicks, tricking victims into unknowingly authorizing access to sensitive data or performing unintended actions.

What Is Double Clickjacking?

Double clickjacking bypasses existing protections against traditional clickjacking attacks. Attackers manipulate the user interface, swapping content between clicks, such as during a CAPTCHA confirmation. When the user clicks the second time, the system inadvertently executes an unintended action, such as changing account settings, authorizing a transaction, or granting access to an application.

Why Is This Attack Dangerous?

  1. Bypasses existing protections: Modern browsers block typical clickjacking, but double clickjacking introduces a new method of attack.
  2. Targets a wide range of systems: Beyond websites, it threatens crypto wallets and mobile devices.
  3. Widespread vulnerability: Virtually every website can be susceptible to this attack.
  4. Simplicity: It only requires a double-click with no additional actions.

How Do Hackers Exploit It?

According to researcher Paulos Yibelo, the main exploitation methods include:

  • OAuth Manipulation: Hackers trick victims into authorizing malicious applications with extensive permissions, leading to account takeovers.
  • Account Setting Changes: A double-click can trigger actions like disabling security features, granting third-party access, or authorizing financial transactions.

How to Protect Yourself

  1. Be cautious with double-click prompts: Avoid interacting with unexpected double-click requests.
  2. Keep your software updated: Watch for updates from browser developers to address this vulnerability.
  3. Monitor network activities: Organizations should actively track suspicious activity patterns.

Conclusion

Cyberattacks are constantly evolving, and double clickjacking demonstrates how hackers can bypass existing safeguards. While security teams work on solutions, users should remain vigilant and avoid unfamiliar web interactions. Until browser protections are available, follow this simple rule: don’t click twice!

LATEST POSTS