Clickjacking (tấn công UI redress) là mối đe dọa bảo mật khi tin tặc che giấu phần tử độc hại dưới giao diện hợp lệ, đánh lừa người dùng nhấn chuột. Hậu quả từ đơn giản (thích bài đăng) đến nghiêm trọng (chuyển tiền, cài phần mềm độc). Phòng chống hiệu quả bằng X-Frame-Options và CSP. Cảnh giác cao độ! 🔒 #WebSecurity #BảoMậtWeb #Clickjacking #TấnCôngClickjacking #Cybersecurity #AnNinhMang (295 ký tự)

https://dev.to/vjnvisakh/unveiling-the-threat-of-clickjacking-in-web-security-75c

Unveiling the Threat of Clickjacking in Web Security

In the realm of web security, one of the stealthy threats that often goes unnoticed is Clickjacking....

DEV Community

#Development #Discoveries
SVG clickjacking attacks · A novel and powerful twist on an old classic https://ilo.im/168wsj

_____
#Attacks #SVG #Clickjacking #Captcha #QrCode #Vulnerability #Security #Browser #WebDev #Frontend

SVG Filters - Clickjacking 2.0

A novel and powerful twist on an old classic.

lyra's epic blog

It's been a busy 24 hours in the cyber world with significant updates on a critical RCE vulnerability under active exploitation, novel attack techniques leveraging AI and web standards, and a timely reminder about evolving authentication best practices. Let's dive in:

AI-Powered Virtual Kidnapping Scams on the Rise 🚨
- Criminals are now leveraging social media images and AI tools to create convincing fake "proof of life" photos and videos for "virtual kidnapping" and extortion scams.
- These sophisticated social engineering attacks pressure victims with threats of violence, demanding immediate ransom payments, echoing the old "grandparent scam" but with a modern, AI-enhanced twist.
- The FBI advises extreme caution: never provide personal info to strangers, establish a family code word, and always attempt to contact the supposed victim directly before making any payments.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/12/05/virtual_kidnapping_scam/

React2Shell RCE Under Widespread Exploitation ⚠️
- The critical React2Shell vulnerability (CVE-2025-55182), an unauthenticated RCE flaw in React Server Components, is under active and widespread exploitation by various threat actors, including China-linked state groups like Earth Lamia, Jackpot Panda, and UNC5174.
- CISA has added CVE-2025-55182 to its Known Exploited Vulnerabilities (KEV) catalog, with over 77,000 internet-exposed IP addresses identified as vulnerable and more than 30 organisations already compromised.
- Post-exploitation activities include reconnaissance, credential theft (especially AWS config files), deployment of webshells, cryptojackers, and malware like Snowlight and Vshell. Cloudflare even experienced an outage while deploying mitigations.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/12/05/react2shell_pocs_exploitation/
🤫 CyberScoop | https://cyberscoop.com/attackers-exploit-react-server-vulnerability/
📰 The Hacker News | https://thehackernews.com/2025/12/critical-react2shell-flaw-added-to-cisa.html
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/react2shell-flaw-exploited-to-breach-30-orgs-77k-ip-addresses-vulnerable/

IDEsaster: 30+ Flaws in AI Coding Tools 🛡️
- New research, dubbed "IDEsaster," has uncovered over 30 vulnerabilities in popular AI-powered Integrated Development Environments (IDEs) like Cursor, GitHub Copilot, and Zed.dev.
- These flaws chain prompt injection with legitimate IDE features, allowing attackers to bypass LLM guardrails and achieve data exfiltration or remote code execution without user interaction.
- The findings highlight a critical need for a "Secure for AI" paradigm, urging developers to apply least privilege to LLM tools, minimise prompt injection vectors, and implement sandboxing for commands.

📰 The Hacker News | https://thehackernews.com/2025/12/researchers-uncover-30-flaws-in-ai.html

Novel Clickjacking via CSS and SVG 🎨
- A security researcher has developed a new clickjacking technique that leverages SVG filters and CSS to leak cross-origin information, effectively bypassing the web's same-origin policy.
- This method allows for complex logic gates to process webpage pixels, enabling sophisticated attacks like exfiltrating Google Docs text, even in scenarios where traditional framing mitigations are absent or ineffective.
- While Google awarded a bounty for the report, the vulnerability remains unpatched across multiple browsers, underscoring the ongoing challenge of securing complex web standards.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/12/05/css_svg_clickjacking/

Passkeys: The Future of Phishing-Resistant MFA 🔒
- Traditional SMS and email one-time passwords (OTPs) are increasingly vulnerable to phishing attacks, making them an unreliable form of multi-factor authentication (MFA).
- Passkeys, based on cryptographic key pairs and FIDO2 standards, represent the "gold standard" for phishing-resistant MFA, offering superior security and a significantly improved user experience with faster logins and reduced helpdesk calls.
- While multi-device passkeys can still be susceptible to social engineering (like Scattered Spider attacks), they remain a substantial upgrade from OTPs, with over 2 billion passkeys already in use and strong adoption expected to continue.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/12/06/multifactor_authentication_passkeys/

#CyberSecurity #ThreatIntelligence #Vulnerability #RCE #React2Shell #CVE_2025_55182 #NationState #APT #Clickjacking #SVG #CSS #AICodingTools #IDEsaster #PromptInjection #MFA #Passkeys #Phishing #SocialEngineering #InfoSec #CyberAttack #IncidentResponse

Crims using social media images, videos in 'virtual kidnapping' scams

: Proof of life? Or an active social media presence?

The Register
🕵️‍♂️🎨 "SVG Clickjacking" 🎨🕵️‍♂️: Because apparently, the world was just DYING for more ways to trick clueless users into unwittingly handing over their #data. 🤷‍♂️🤦‍♀️ Who knew #infosec was all about turning "harmless" #design elements into sinister traps? 🕸️🔒
https://lyra.horse/blog/2025/12/svg-clickjacking/ #SVG #Clickjacking #security #privacy #HackerNews #ngated
SVG Filters - Clickjacking 2.0

A novel and powerful twist on an old classic.

lyra's epic blog
SVG Filters - Clickjacking 2.0

A novel and powerful twist on an old classic.

lyra's epic blog
Proton Pass is protected against clickjacking attacks | Proton

Following a report about clickjacking at DEF CON 33, we addressed a vulnerability in Proton Pass: Find out more

Proton
Tıklayan ne var ne yok kaybediyor! İşte, banka hesabını boşaltan taktik...: Siber güvenlik alanı, “DoubleClickjacking” adı verilen yeni bir hacker yöntemiyle karşı karşıya. Bu teknik, kullanıcıların farkında olmadan kritik işlemleri onaylamalarını sağlamak üzere tasarlanmış karmaşık bir tuzak. Özellikle banka havalesi yapmak veya kişisel verilere erişim sağlamak gibi… https://www.eshahaber.com.tr/haber/tiklayan-ne-var-ne-yok-kaybediyor-iste-banka-hesabini-bosaltan-taktik...-260312.html?utm_source=dlvr.it&utm_medium=mastodon EshaHaber.com.tr #SiberGüvenlik #DoubleClickjacking #Clickjacking #HackerTaktikleri #BankaHesabı

Výskum Mareka Tótha ukázal zraniteľnosť 11 populárnych rozšírení správcov hesiel vrátane 1Password a Bitwarden. Odporúča sa vypnúť autofill a umožniť aktiváciu rozšírení len na vyžiadanie, kým sa nevydajú opravy. #bezpečnosť #cybersecurity #clickjacking

PS: pre Bitwarden už bola vydaná aktualizácia

https://marektoth.com/blog/dom-based-extension-clickjacking/

DOM-based Extension Clickjacking: Your Password Manager Data at Risk

Security Researcher | Ethical Hacker | Web Application Security

Пароли не там, где вы их оставили. Как работает DOM Clickjacking

Если честно, менеджеры паролей давно стали для меня чем‑то вроде зубной щётки. Пользуюсь каждый день, но задумываюсь о них только тогда, когда что‑то идёт не так. Обычно всё просто: клик — и нужная форма заполнена. Красота. Но именно эта красота может сыграть злую шутку. Совсем недавно я наткнулся на исследование про DOM Clickjacking, и понял, что даже привычное «автозаполнить» может подставить. В отличие от старого доброго clickjacking с iframe, здесь никто ничего поверх не накладывает. Всё хитрее: страница сама превращается в ловушку. Менеджер паролей видит поле логина и честно вставляет туда пароль. А пользователь (ну то есть мы с вами) жмёт на кнопку и уверен, что всё нормально. На самом деле клик улетает в невидимый элемент, и данные — вместе с ним. Честно говоря, когда я это увидел на демо, стало немного не по себе. Есть три главные причины, почему расширения ведутся на такой обман. Во‑первых, некоторые из них слишком доверчиво вставляют пароль сразу, без всякого подтверждения. Во‑вторых, они проверяют только домен верхнего уровня. А если у сайта есть хитрый поддомен — привет, уязвимость. И в‑третьих, далеко не все разработчики заморачиваются с CSP, поэтому любой внедрённый скрипт может вытворять с DOM что угодно. Проверить страницу самому несложно. Открываете DevTools, смотрите на элементы. Если видите кучу строк с opacity:0 или position:absolute; left:-9999px — повод насторожиться. В Chrome во вкладке Layers это особенно хорошо видно. Для любителей автоматизации есть и короткий скрипт на JavaScript, который подсветит такие штуки.

https://habr.com/ru/articles/941712/

#информационная_безопасность #браузерные_расширения #менеджеры_паролей #dom #clickjacking #двухфакторная_аутентификация #totp #passkeys

Пароли не там, где вы их оставили. Как работает DOM Clickjacking

Если честно, менеджеры паролей давно стали для меня чем‑то вроде зубной щётки. Пользуюсь каждый день, но задумываюсь о них только тогда, когда что‑то идёт не так. Обычно всё просто: клик — и нужная...

Хабр
📢 Une faille de clickjacking expose les gestionnaires de mots de passe via leurs extensions
📝 Selon Malwarebytes, le chercheur Marek Tóth a présenté à DEFCON une **attaque de cli...
📖 cyberveille : https://cyberveille.ch/posts/2025-08-27-une-faille-de-clickjacking-expose-les-gestionnaires-de-mots-de-passe-via-leurs-extensions/
🌐 source : https://www.malwarebytes.com/blog/news/2025/08/clickjack-attack-steals-password-managers-secrets
#autoremplissage #clickjacking #Cyberveille