Back

A New type of web hacking technique: DoubleClickjacking

96 points4 dayspaulosyibelo.com
krunck3 hours ago

Browser content should never be able to modify the configuration of my desktop window layout by opening a new window. There I said it.

KTibow48 minutes ago

TFA doesn't use separate windows, only separate tabs.

NoMoreNicksLeft2 hours ago

Agreed, but I think this was a workaround for early web apps that existed in the primitive days. You'd need two webpages of the same site open to complete some task, but the apps weren't sophisticated enough to do that within a single window/tab. Once they did it back then, now too many web apps and workflows would suffer if they just killed that functionality entirely, too many users would scream.

bangaladore2 hours ago

Bit off topic, but what's the reasoning behind messing with the native browser scroll here. Almost gets me motion sick when scrolling through this article.

packtreefly1 hour ago

It is the height of irony to me that a blog post complaining about clickjacking is presented on a website that is guilty of scrolljacking.

thoughtpalette1 hour ago

I thought the same. Glad to see it called out here. Maybe that's the post for next week...

mediumsmart26 minutes ago

the scrolling is almost normal in librewolf - but that is with privacy badger blocking 14 trackers on that page ...

technion2 hours ago

Marketing people have demanded this on many websites sites I've been involved with. Don't ask me why.

ndriscoll53 minutes ago

Maybe the industry should develop a secret header we can all have our browser send to disable this sort of thing. Like `X-Shibboleet: true`.

dmix2 hours ago

What is it? Smooth scrolling?

bangaladore1 hour ago

From the html:

// SmoothScroll for websites v1.2.1

hombre_fatal37 minutes ago

You'd think the library would first check for macOS/iOS which already has far superior smooth scrolling.

braiamp1 hour ago

And this is why NoScript is a required extension. Matrix if you use Chromium based browsers.

gwbas1c2 hours ago

I'm a little skeptical that this is a real exploit.

When I watched the Salesforce video, the exploit was demonstrated by pointing the browser at a file on disk, not on a public website. I also don't understand the "proof," IE, something showed up in the salesforce inbox, but I don't understand how that shows that the user was hacked. It appears to be an automated email from an identity provider.

I also don't understand when the popup is shown, and what the element is when the popup is closed.

Some slow-mo with highlighting on the fake window, and the "proof of exploit," might make this easier to understand and demonstrate

akersten1 hour ago

It's also not a novel threat model. For example prior art, the browser confirmation dialogs in Firefox at least don't enable their buttons until the window has had focus for 500ms or so. Possibly to avoid inadvertently unintentionally clicking "run" on a recently downloaded item, but it solves for this too and I wouldn't be shocked if this was on their mind too.

If I were running some site where pressing a button does some kind of auth that I really want a user to read, that seems like a reasonable mitigation compared to the hyperbole found in the article:

> This technique seemingly affects almost every website

maxrmk2 hours ago

This is clever, and I got a good laugh out of their example video. The demo UI of "Double click here" isn't very convincing - I bet there's a version of this that gets people to double click consistently though.

chatmasta39 minutes ago

The exploit would be more effective if it obfuscated the UI on the authorization (victim) page. Right now, even if you double click a convincing button, it’s extremely obvious that you just got duped (no pun intended).

Sure, maybe the attacker can abuse the access privileges before you have a chance to revoke them. But it’s not exactly a smooth clickjacking.

I’d start by changing the dimensions of the parent window (prior to redirecting to victim) to the size of the button on the target page - no need to show everything around it (assuming you can make it scroll to the right place). And if the OAuth redirects to the attacker page, it can restore the size to the original.

Back in the day, this trick was used for clickjacking Digg upvotes.

bee_rider42 minutes ago

Hmm. I guess it is never impossible that there’s a version of something that will trick people consistently. But, I’m kinda struggling to recall a time I’ve needed to double click on a website.

Actually the double-click action is pretty rare nowadays, right? In particular, I use it a lot to select a word in a terminal, but most of the time when I am getting UI instructions it is from a website about how to use the website itself, and since that’s a website it has to be abstract enough to also make sense for mobile users.

Telling people to double click is, I think, mostly dead.

foobazgt32 minutes ago

My mother constantly struggles between when to double click or not after decades of using computers. This is probably an issue that will die out with her generation, though.

Entirely separate, a common failure mode of dying mice is that they start generating spurious clicks. I've had a couple of logitechs do this to me. And the thing about scams is you can often legit make money off of very low success rates.

chatmasta38 minutes ago

It doesn’t need to be a literal double click. It could be something like a CAPTCHA “confirm you’re human,” where you click once, it appears to load, and then you click a confirm button. Do it fast enough and it might appear like a double click.

Not sure this would work with the exploit though.

efortis4 days ago

I think the suggested mitigation will only work when the user double-clicks without moving the mouse.

So I'd try adding a small timeout when the tab is visible:

  document.addEventListener("visibilitychange", () => {
    if (!document.hidden)
      setTimeout(enableButtons, 200)
  })
efortis29 minutes ago

and `disableButtons` on `document.hidden`

sharpshadow4 hours ago

New fear unlocked lazy cookie consent banners.

yellow_lead4 hours ago

Am I mistaken or does this require the user to allow pop-ups?

gruez3 hours ago

Default configuration for most browsers is to allow popups if it was initiated by a user action.

gnabgib4 days ago

Title: DoubleClickjacking: A New Era of UI Redressing

IshKebab4 hours ago

Eh, it's hardly seamless, and double clicking is extremely uncommon on the web so that would be a big red flag.

Etheryte3 hours ago

I couldn't even begin to count how many bug reports I've seen over the years that start with "when I accidentally double-click foo, bar happens". It might not be an intentional usage pattern, sure, but that doesn't mean it doesn't happen a lot.

kevinsync48 minutes ago

Yeah, I have no data beyond anecdotal to back this up, but I witness A LOT of people double-clicking everything, regardless of what it is. I assume it's because they only got so far in "computer" as to learn "click + drag to move, double-click to open a program or file". Link on a web page? I want to open that!

uhoh-itsmaciek3 hours ago

Google Drive uses it as an interaction pattern. I find that baffling, but while uncommon, it's not totally absent. And as others have pointed out, many users carry over their expectation of having to double-click from desktop interfaces.

recursive2 hours ago

I double click to select text all the time. Get your flags ready.

bangaladore1 hour ago

I'd laugh if an effective way to present this is:

CAPTCHA:

Please copy `qwertyuiopasdfhkl`

Into here `<textbox>`

Edit: Quick (ai mockup) concept... https://imgur.com/mc0IdEA Obviously it would be most effective with a longer string though.

kazinator2 hours ago

Web browsers and the applications on them have become extremely memory hungry. Memory management pauses are common and people click multiple times irately.

giantrobot4 hours ago

Double clicking on the web is extremely common with older less technically adept users. This same cohort is also the most susceptible to scams.

bangaladore2 hours ago

Another obvious case of double click is to select all text in a given area. This one is a bit more obscure though.

Edit: Actually that's generally I guess triple click. Double to select a word.

waltwalther4 hours ago

This. I have told my eighty-year-old parents this many times over the years, but it doesn't seem to stick.

Moru4 hours ago

I see a lot of people doubleclicking on the web. Both young and old.

NotYourLawyer3 hours ago

I’ve tried to explain it many times too, but I can’t really articulate a good, comprehensive rule for when to single and when to double click.

wat1000030 minutes ago

In theory: if you’re clicking on a UI element that has some notion of being selected, then a single-click selects it, and you need a double-click to take an action on it. If there’s no notion of selection, then a single click takes an action.

In practice: adherence to this ranges from perfect to abysmal. And users who don’t understand the computer well may not know how to think about whether a given UI element is selectable or not.

cobbal2 hours ago

Another complicating factor that many less-tech-literate don't have a good internal model for is window focus. I've seen several people try and single-click on a not focused web button, only for nothing to happen. When they click again, the button is activated. They then learn to always double click that button.

Having a mental model of "this button needs to be double clicked" gets them the result they want, even if that's not a very accurate reflection of the computer.

+1
Pxtl2 hours ago
doublerabbit3 hours ago

> double clicking is extremely uncommon on the web so that would be a big red flag.

You've never had a slow internet connection have you? I've seen double clicking from all users in the office. Comes from frustration.

How many times have you tried to open an application; for it not open? So you click the icon again only for two windows to split open?

Young, old, even techs. It's not as uncommon as you think.

portaouflop2 hours ago

I’ve even triple or quadruple clicked sometimes with disastrous results