Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

10/8/2008
04:47 PM
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Clickjacking Attack Lets Web Sites See, Hear You

The technique can be used to hijack a computer's Webcam and microphone to create a malicious surveillance platform.

Details about the cross-platform browser exploitation technique known as "clickjacking" have started to emerge. Among the more alarming ways it can be used: covertly watching and listening to people who have microphones and Webcams attached to their computers.

"Web pages know what Web sites you've been to ..., where you're logged in, what you watch on YouTube, and now they can literally 'see' and 'hear' you," warned Jeremiah Grossman, founder and CTO of WhiteHat Security, in a blog post.

On Tuesday, Flash developer Guy Aharonovsky published a proof-of-concept exploit to show how clickjacking can be used to spy on people. "I've written a quick and dirty Javascript game [to] exploit just that, and demonstrate how an attacker can get a hold of the user's camera and microphone," he said in a blog post. "This can be used, for example, with platforms [like Ustream.tv or Justin.tv] or to stream to a private server to create a malicious surveillance platform."

Grossman and Robert "RSnake" Hansen, founder and CEO of SecTheory, discovered the clickjacking technique, called "UI redressing" by some, and planned to discuss it at the 2008 Open Web Application Security Project USA NYC security conference last month. But the pair decided to delay disclosure to allow affected vendors time to address the issue.

Unfortunately, this hasn't proven to be easy because clickjacking encompasses a range of attack techniques and affects a variety of software applications, including the major Web browsers and a number of plug-ins like Adobe Flash.

Clickjacking, as Grossman previously described the attack, "gives an attacker the ability to trick a user into clicking on something only barely or momentarily noticeable. Therefore, if a user clicks on a Web page, they may actually be clicking on content from another page."

Adobe on Tuesday issued a security advisory that describes a way to mitigate the risk faced by those with Adobe Flash Player installed -- almost everyone online. The advisory applies to Adobe Flash Player 9.0.124.0 and earlier.

Adobe recommends setting the "Always deny" button in the Global Privacy Settings panel of the Adobe Flash Player settings. The company is also working on an update to its Flash Player software that will address the vulnerability.

While this step protects against clickjacking attacks that use Adobe Flash, many other software applications remain vulnerable. In a blog post, Hansen outlines the status of eight different issues, only some of which have been resolved. He stresses that there are multiple variants of clickjacking, some of which require cross-domain access, some of which use iframes, some of which require JavaScript, and some of which involve page overlays.

How to defend against clickjacking? "Put tape over your camera, disable your microphone, install NoScript, and/or disable your plug-ins," advises Grossman, even as he concedes few users will be willing to lose access to YouTube and Flash games as a result.

Nevertheless, U.S. CERT said much the same thing in an advisory late last month.

The latest version of NoScript, a Firefox browser plug-in that blocks Flash, Java, and JavaScript, includes a new anti-clickjacking feature called ClearClick. It reveals transparent or concealed windows so the user can see attempts to co-opt clicks for malicious purposes.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-18661
PUBLISHED: 2021-06-24
Cross Site Scripting (XSS) vulnerability in gnuboard5 <=v5.3.2.8 via the url parameter to bbs/login.php.
CVE-2020-21787
PUBLISHED: 2021-06-24
CRMEB 3.1.0+ is vulnerable to File Upload Getshell via /crmeb/crmeb/services/UploadService.php.
CVE-2020-21788
PUBLISHED: 2021-06-24
In CRMEB 3.1.0+ strict domain name filtering leads to SSRF(Server-Side Request Forgery). The vulnerable code is in file /crmeb/app/admin/controller/store/CopyTaobao.php.
CVE-2021-23398
PUBLISHED: 2021-06-24
All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output.
CVE-2021-33348
PUBLISHED: 2021-06-24
An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases.