TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
How DoubleClickjacking could lead to account takeovers on major platforms

How DoubleClickjacking could lead to account takeovers on major platforms

DoubleClickjacking is a timing-based vulnerability class that capitalizes on a double-click sequence rather than a single click

Kerem GülenbyKerem Gülen
2 January 2025
in Security, Tech
Reading Time: 2 mins read
Share on FacebookShare on Twitter

A new cyber threat named DoubleClickjacking has been disclosed by security researcher Paulos Yibelo, exposing vulnerabilities on major websites and effectively bypassing existing clickjacking protections.

New cyber threat DoubleClickjacking exposes major website vulnerabilities

DoubleClickjacking is a timing-based vulnerability class that capitalizes on a double-click sequence rather than a single click. Yibelo explained that this minor shift enables new UI manipulation attacks that can bypass all known clickjacking defenses, including the X-Frame-Options header and SameSite cookies.

Clickjacking, also known as UI redressing, tricks users into clicking on seemingly harmless web page elements, which can lead to malware deployment or sensitive data exfiltration. The DoubleClickjacking technique exploits the timing gap between the first click and the second click to execute attacks with minimal user interaction.

DoubleClickjacking involves several steps. The attacker creates an innocent-looking website that prompts users to double-click a button, which may appear to be a CAPTCHA verification. When the user initiates the double-click, the attacker employs the JavaScript Window Location object to stealthily redirect to a malicious page, such as an OAuth authorization dialog. As the top window closes, the user unknowingly grants access by approving the permission confirmation dialog.

How DoubleClickjacking could lead to account takeovers on major platforms
Image: Paulos Yibelo

Yibelo noted that most web applications and frameworks are designed to mitigate risks associated with single forced clicks, rendering current clickjacking defenses inadequate against this new variant. The attack leverages the timing and event sequence in ways that existing security protocols cannot effectively address.

The vulnerabilities associated with DoubleClickjacking pose significant risks on platforms that utilize OAuth for account authorizations. Affected websites risk suffering from account takeovers, unauthorized authorization of malicious applications, alteration of critical account settings, and initiation of financial transactions. Major websites including Salesforce, Slack, and Shopify have been identified as vulnerable.

This attack also affects browser extensions, such as crypto wallets and VPNs, allowing attackers to disable essential security features or authorize transactions without the user’s consent.

DoubleClickjacking can evade traditional protections like X-Frame-Options headers, Content Security Policies (CSP), and SameSite cookies. The vulnerability capitalizes on the rapid timing of user interactions, requiring only a double-click to exploit the user.

The security researcher delivered a cautionary message, stating that websites and developers need to urgently implement new protective measures to tackle this vulnerability effectively.

To address the DoubleClickjacking vulnerability, security experts recommend several mitigation strategies. A client-side approach can be adopted where developers disable critical buttons by default until genuine user interaction is detected, utilizing JavaScript solutions. For example, a script may disable form buttons until mouse movement or key presses are identified.

Long-term solutions involve browser vendors introducing new standards similar to X-Frame-Options to defend against rapid context-switching during double-click sequences. Recommended measures may include creating a Double-Click-Protection HTTP header and adapting CSP directives to account for multi-click scenarios.

Additionally, developers should add protective scripts to sensitive pages and enforce stricter controls over embedded windows or opener-based navigation to strengthen defenses against this new attack method.


Featured image credit: Kerem Gülen/Midjourney

Tags: cybersecurityfeatured
ShareTweet
Kerem Gülen

Kerem Gülen

Kerem from Turkey has an insatiable curiosity for the latest advancements in tech gadgets and a knack for innovative thinking.With 3 years of experience in editorship and a childhood dream of becoming a journalist, Kerem has always been curious about the latest tech gadgets and is constantly seeking new ways to create.As a Master's student in Strategic Communications, Kerem is eager to learn more about the ever-evolving world of technology. His primary focuses are artificial intelligence and digital inclusion, and he delves into the most current and accurate information on these topics.

Related Posts

Anthropic redesigns hiring tests after Claude 4.5 “aces” human interview

Anthropic redesigns hiring tests after Claude 4.5 “aces” human interview

22 January 2026
NexPhone debuts as the first “triple-OS” smartphone for power users

NexPhone debuts as the first “triple-OS” smartphone for power users

22 January 2026
Google Photos v7.59 may kill the “Modify” button in sharing overhaul

Google Photos v7.59 may kill the “Modify” button in sharing overhaul

22 January 2026
Snapchat gives parents trust signals to vet teen friend connections

Snapchat gives parents trust signals to vet teen friend connections

22 January 2026

LATEST

Blue Origin’s New Glenn-3 mission to deploy AST SpaceMobile’s BlueBird 7

Anthropic redesigns hiring tests after Claude 4.5 “aces” human interview

NexPhone debuts as the first “triple-OS” smartphone for power users

Google Photos v7.59 may kill the “Modify” button in sharing overhaul

Snapchat gives parents trust signals to vet teen friend connections

Spotify launches Prompted Playlists to let users steer the algorithm

Amazon expands healthcare portfolio with new generative Health AI tool

What to expect at Samsung Galaxy Unpacked 2026

SpaceX targets $1.5 trillion valuation with potential July 2026 IPO

YouTube enables creators to generate AI likenesses for Shorts

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska