Clickjacking, also known as a “UI Redress Attack”, is when an attacker uses multiple transparent or vague layers to trick a user into clicking on a button or link on another page when they were intending to click on the top-level page. Thus, the attacker is “hijacking” clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.
Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.
One of the most famous examples of Clickjacking was an attack against the Adobe Flash plugin settings page. By loading this page into an invisible iframe, an attacker could trick a user into altering the security settings of Flash, giving permission for any Flash animation to utilize the computer’s microphone and camera.
While it may be difficult for the typical SMB Owner to take actions to prevent this from occurring, there are some things your IT staff can help you set up. According to OWASP, there are three main strategies that can be used to defend against these attacks:
Note that these mechanisms are all independent of each other, and where possible more than one of them should be implemented in order to provide defense in depth. In addition to these actions, these basic measures should be in place to secure your users: