{"id":16174,"date":"2019-08-27T10:10:03","date_gmt":"2019-08-27T18:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/27\/news-9917\/"},"modified":"2019-08-27T10:10:03","modified_gmt":"2019-08-27T18:10:03","slug":"news-9917","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/27\/news-9917\/","title":{"rendered":"Study explores clickjacking problem across top Alexa-ranked websites"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Tue, 27 Aug 2019 17:36:52 +0000<\/strong><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/glossary\/clickjacking\/\" target=\"_blank\" rel=\"noopener noreferrer\">Clickjacking<\/a> has been around for a long time, working hand-in-hand with the unwitting person doing the clicking to send them to parts unknown\u2014often at the expense of site owners. Scammers achieve this by hiding the page object the victim <em>thinks<\/em> they\u2019re clicking on under a layer (or layers) of obfuscation. Invisible page elements like buttons, translucent boxes, invisible frames, and more are some of the ways this attack can take place.<\/p>\n<p>Despite being an old tool, clickjacking is becoming a worsening problem on the web. Let&#8217;s explore how clickjacking works, recent research on clickjacking, including the results of a study examining the top 250,000 Alexa-ranked websites, and other ways in which researchers and site owners are trying to better protect users from this type of attack.<\/p>\n<h3>Laying the groundwork<\/h3>\n<p>There are many targets of clickjacking.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>Cursors, cookies, files, even your social media likes. Traditionally, an awful lot of clickjacking relates to adverts and fraudulent money making. In the early days of online ad programs, certain keywords that brought a big cash return for clicks became popular targets for scammers. Where they couldn\u2019t get people to unintentionally click on an ad, they\u2019d try to automate the process instead.<\/p>\n<p>Here\u2019s an example from 2016, playing on the <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/01\/clickjacking-campaign-plays-on-european-cookie-law\/\" target=\"_blank\" rel=\"noopener noreferrer\">seemingly never-ending European cookie law messages<\/a> on every website ever. Pop a legitimate ad, make it invisible, and overlay it across a Cookie pop-up. At that point, it\u2019s unintentional advert time.<\/p>\n<p>This is not to say clickjacking techniques are stagnant; here\u2019s a <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/01\/clickjacking-campaign-abuses-google-adsense-avoids-ad-fraud-bots\/\" target=\"_blank\" rel=\"noopener noreferrer\">good example<\/a> of how these attacks are tough to deal with.<\/p>\n<h3>Clickjacking: back in fashion<\/h3>\n<p>There\u2019s a lot of clickjack-related activity taking place at the moment, so researchers are publishing their works and helping others take steps to secure browsers.<\/p>\n<p>One of those research pieces is called <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/all-your-clicks-belong-to-me-investigating-click-interception-on-the-web\/\" target=\"_blank\" rel=\"noopener noreferrer\">All your clicks belong to me: investigating click interception on the web<\/a>, focusing on JavaScript-centric URL access. I was hoping the recording of the talk from <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity19\" target=\"_blank\" rel=\"noopener noreferrer\">USENIX Security Symposium<\/a> would be available to link in this blog, but it\u2019s not currently online yet\u2014when it is, I\u2019ll add it. The talk is all about building a way to observe possible clickjack activity on some of the most popular websites in the world and reporting back with the findings.<\/p>\n<p>Researchers from a wide variety of locations and organisations pooled resources and came up with something called \u201cObserver,\u201d a customised version of Chromium, the open-source browser. With it, they can essentially see under the hood of web activity and tell at a glance the point of origin of URLs from every link.<\/p>\n<p>As per the research paper, Observer focuses on three actions JavaScript code may perform in order to intercept a click:<\/p>\n<ul>\n<li>Modifying existing links on a page<\/li>\n<li>Creating new links on a page<\/li>\n<li>Registering event handlers to HTML elements to \u201chook\u201d a click<\/li>\n<\/ul>\n<p>All such events are identified and tagged with a unique ID for whichever script kicked the process into life, alongside logging page navigation to accurately record where an intercepted click is trying to direct the victim.<\/p>\n<p>Observer logs two states of each webpage tested: the page fully rendered up to a 45-second time limit, and then interaction data, where they essentially see what a site does when used. It also checks if user clicks update the original elements in any way.<\/p>\n<p>Some of the specific techniques Observer looks for:<\/p>\n<ul>\n<li>Visual deception tricks from third parties, whether considered to be malicious or accidental. This is broken down further into page elements which look as though they\u2019re from the site, but are simply mimicking the content. A bogus navigation bar on a homepage is a good example of this. They also dig into the incredibly common technique of transparent overlays, a perennial favourite of clickjackers the world over.<\/li>\n<li>Hyperlink interception. Third party scripts can overwrite the href attribute of an original website link and perform a clickjack. They detect this, as well as keeping an eye out for dubious third-party scripts performing this action on <em>legitimate<\/em> third-party scripts located on the website. Observer also checks for another common trick: large clickable elements on a page, where any interaction with the enclosed element is entirely under its control.<\/li>\n<li>Event handler interception. Everything you do on a device is an event. Event handlers are routines which exist to deal with those events. As you can imagine, this is a great inroad for scammers to perform some clickjacking shenanigans. Observer looks for specific <a href=\"https:\/\/www.howtogeek.com\/343877\/what-is-an-api\/\">API calls<\/a> and a few other things to determine if clickjacking is taking place. As with the large clickable element trick up above, it checks for large elements from third parties.<\/li>\n<\/ul>\n<h3>Study results<\/h3>\n<p>Observer crawled the <a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_most_popular_websites\" target=\"_blank\" rel=\"noopener noreferrer\">Alexa top 250,000 websites<\/a> from May 2018, ending up with valid data from 91.45 percent of the sites they checked accounting for timeouts and similar errors. From 228,614 websites, they ended up with 2,065,977 unique third-party navigation URLs corresponding to 427,659 unique domains, with an average of 9.04 third-party navigation URLs pointing to 1.87 domains.<\/p>\n<p>Checking for the three main type of attack listed above, they found no fewer than 437 third-party scripts intercepting user clicks on 613 websites. Collectively, those sites receive about 43 million visitors daily. Additionally, a good slice of the sites were deliberately working with dubious scripts for the purpose of monetizing the stolen clicks, to the tune of 36 percent of interception URLs being related to online advertising.<\/p>\n<p>The full paper is a fascinating read, and well worth digging through [<a href=\"https:\/\/www.usenix.org\/system\/files\/sec19fall_zhang_prepub.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>].<\/p>\n<h3>Plans for the future<\/h3>\n<p>Researchers point out that there\u2019s room for improvement with their analysis\u2014this is more of a \u201cgetting to know you\u201d affair than a total deep dive. For example, with so many sites to look at, they only look at the main page for analysis. If there were nasties lurking on subpages, they wouldn\u2019t have seen it.<\/p>\n<p>They also point out that their scripted website interaction quite likely isn\u2019t how actual flesh-and-blood people would use the websites. All the same, this is a phenomenal piece of work and a great building block for further studies.<\/p>\n<h3>What else is happening in clickjacking?<\/h3>\n<p>Outside of conference talks and research papers, there\u2019s also word that a three-year-old suggestion for combating iFrame clickjacking has been revived and expanded <a href=\"https:\/\/www.theregister.co.uk\/2019\/08\/19\/clickjacking_countermeasures_chrome\/\" target=\"_blank\" rel=\"noopener noreferrer\">for Chrome<\/a>. Elsewhere, Facebook is <a href=\"https:\/\/techcrunch.com\/2019\/08\/06\/facebook-clickjacking-ad-fraud-suit\/\" target=\"_blank\" rel=\"noopener noreferrer\">suing app developers<\/a> for click injection fraud.<\/p>\n<p>As you can see from a casual check of Google\/Yahoo news, clickjacking isn\u2019t a topic perhaps covered as often as it should be. Nevertheless, it\u2019s still a huge problem, generates massive profits for people up to no good, and deserves to hog some of the spotlight occasionally.<\/p>\n<h3>How can I avoid clickjacking?<\/h3>\n<p>This is an interesting one to ponder, as this isn\u2019t just an end-user thing. Website owners need to do their bit, too, to ensure visitors are safe and sound on their travels [<a href=\"https:\/\/www.hacksplaining.com\/prevention\/click-jacking\" target=\"_blank\" rel=\"noopener noreferrer\">1<\/a>], [<a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Clickjacking_Defense_Cheat_Sheet.html\" target=\"_blank\" rel=\"noopener noreferrer\">2<\/a>], [<a href=\"https:\/\/www.ibm.com\/support\/knowledgecenter\/en\/SSWU4L\/Integrations\/imc_Integrations\/Integrations_q_a_watson_assistant\/Salesforce.com_Clickjack_Protection_Anno205.html\" target=\"_blank\" rel=\"noopener noreferrer\">3<\/a>]. As for the people sitting behind their keyboards, the advice is pretty similar to other security precautions.<\/p>\n<p>Given how<span class=\"Apple-converted-space\">\u00a0<\/span>much of clickjacking is based around bogus advertising cash, consider what level of exposure to ads you\u2019re comfortable with. Deploying a combination of <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2018\/07\/mother-is-blocking-ads-so-why-arent-you\/\" target=\"_blank\" rel=\"noopener noreferrer\">adblockers and script control extensions<\/a>, especially where JavaScript is concerned, will work wonders.<\/p>\n<p>Those plugins could easily break the functionality of certain websites though, and that\u2019s before we stop to consider that many sites won\u2019t even give you access if ads are blocked entirely. It comes down, as it often does, to ad networks <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2015\/06\/advertising-the-digital-turf-war-on-your-desktop\/\" target=\"_blank\" rel=\"noopener noreferrer\">waging war on your desktop<\/a>. How well you fare against the potential risks of clickjacking could well depend where exactly you plant your flag with regards advertiser access to your system.<\/p>\n<p>Whatever you choose, we wish you safe surfing and a distinct lack of clickjacking. With any luck, we&#8217;ll see more research and solutions proposed to combat this problem in the near future.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/study-explores-clickjacking-problem-across-top-alexa-ranked-websites\/\">Study explores clickjacking problem across top Alexa-ranked websites<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/study-explores-clickjacking-problem-across-top-alexa-ranked-websites\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Tue, 27 Aug 2019 17:36:52 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/study-explores-clickjacking-problem-across-top-alexa-ranked-websites\/' title='Study explores clickjacking problem across top Alexa-ranked websites'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/shutterstock_388811320.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We look at recent research exploring the threat of clickjacking, along with other solutions considered by site owners and analysts for protecting users against these online attacks.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/web-threats\/\" rel=\"category tag\">Web threats<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/advertising\/\" rel=\"tag\">advertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/alexa\/\" rel=\"tag\">alexa<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/alexa-ranked-websites\/\" rel=\"tag\">alexa-ranked websites<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/chromium\/\" rel=\"tag\">chromium<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/clickjacking\/\" rel=\"tag\">clickjacking<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/clickjacking-attacks\/\" rel=\"tag\">clickjacking attacks<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/clickjacking-research\/\" rel=\"tag\">clickjacking research<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/observer\/\" rel=\"tag\">observer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ranking\/\" rel=\"tag\">ranking<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/research\/\" rel=\"tag\">research<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/study\/\" rel=\"tag\">study<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/web-threats\/\" rel=\"tag\">web threats<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/websites\/\" rel=\"tag\">websites<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/study-explores-clickjacking-problem-across-top-alexa-ranked-websites\/' title='Study explores clickjacking problem across top Alexa-ranked websites'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/web-threats\/2019\/08\/study-explores-clickjacking-problem-across-top-alexa-ranked-websites\/\">Study explores clickjacking problem across top Alexa-ranked websites<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11147,7003,22752,22753,20894,22754,22755,13832,22756,1931,9191,11716,12912],"class_list":["post-16174","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-advertising","tag-alexa","tag-alexa-ranked-websites","tag-chromium","tag-clickjacking","tag-clickjacking-attacks","tag-clickjacking-research","tag-observer","tag-ranking","tag-research","tag-study","tag-web-threats","tag-websites"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16174"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16174\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16174"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}