Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Microsoft adds Copilot-powered debugging features for .NET in Visual Studio

      August 21, 2025

      Blackstone portfolio company R Systems Acquires Novigo Solutions, Strengthening its Product Engineering and Full-Stack Agentic-AI Capabilities

      August 21, 2025

      HoundDog.ai Launches Industry’s First Privacy-by-Design Code Scanner for AI Applications

      August 21, 2025

      The Double-Edged Sustainability Sword Of AI In Web Design

      August 20, 2025

      How VPNs are helping people evade increased censorship – and much more

      August 22, 2025

      Google’s AI Mode can now find restaurant reservations for you – how it works

      August 22, 2025

      Best early Labor Day TV deals 2025: Save up to 50% on Samsung, LG, and more

      August 22, 2025

      Claude wins high praise from a Supreme Court justice – is AI’s legal losing streak over?

      August 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Preserving Data Integrity with Laravel Soft Deletes for Recovery and Compliance

      August 22, 2025
      Recent

      Preserving Data Integrity with Laravel Soft Deletes for Recovery and Compliance

      August 22, 2025

      Quickly Generate Forms based on your Eloquent Models with Laravel Formello

      August 22, 2025

      Pest 4 is Released

      August 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      FOSS Weekly #25.34: Mint 22.2 Features, FreeVPN Fiasco, Windows Update Killing SSDs, AI in LibreOffice and More

      August 21, 2025
      Recent

      FOSS Weekly #25.34: Mint 22.2 Features, FreeVPN Fiasco, Windows Update Killing SSDs, AI in LibreOffice and More

      August 21, 2025

      You’ll need standalone Word, PowerPoint, Excel on iOS, as Microsoft 365 app becomes a Copilot wrapper

      August 21, 2025

      Microsoft to Move Copilot Previews to iOS While Editing Returns to Office Apps

      August 21, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»DOM-Based Extension Clickjacking Exposes Millions of Password Manager Users to Credential Theft

    DOM-Based Extension Clickjacking Exposes Millions of Password Manager Users to Credential Theft

    August 21, 2025

    DOM‑based extension

    A newly discovered technique, dubbed DOM-based extension clickjacking, has raised serious concerns about the security of browser-based password managers. Despite their role in protecting sensitive information, such as login credentials, credit card data, and TOTP codes (Time-based One-Time Passwords), this attack demonstrates how a single deceptive click can result in total data compromise. 

    Decoding DOM‑based Extension Clickjacking 

    Security researcher Marek Tóth revealed DOM‑based extension clickjacking at DEF CON 33 in August. Tóth demonstrated how malicious websites can exploit password manager browser extensions by manipulating Document Object Model (DOM) elements injected by these extensions.  

    The core idea involves hiding legitimate autofill interfaces via CSS properties like opacity: 0 or positioning them off-screen. Then, attackers overlay fake UI elements, such as cookie banners or modal windows, to mislead users into clicking what appear to be harmless elements. 

    These seemingly innocuous interactions can trigger the hidden autofill mechanisms of password managers. As a result, sensitive data like usernames, passwords, credit card details, or even TOTP codes can be captured and exfiltrated by attackers without the user’s awareness. 

    Scope and Impact 

    The attack was tested across 11 of the most widely used password manager extensions: 

    • Credential theft was successful in 10 out of 11 managers. 
    • Credit card data, including CVV numbers, was extractable in 6 out of 9 tested. 
    • Personal data exfiltration was possible in 8 out of 10. 
    • Passkey authentication was compromised in 8 out of 11. 

    This translates to a potential risk for approximately 40 million users worldwide, based on extension download data from major browser stores. The attack affects not only Chromium-based browsers but also those running other engines. 

    Exploit Mechanics 

    The attack consists of several stages: 

    1. User Interaction Hijacking: The attacker presents a fake UI overlay to the user—such as a cookie consent form—designed to encourage interaction. 
    2. Bypassing Overlay Protections: The attacker sets pointer-events: none on the overlay, allowing clicks to pass through to the underlying autofill elements from the password manager. 
    3. Fake Form Injection: Autocomplete-enabled input fields are precisely positioned below the cursor. A JavaScript function captures the autofilled data using onchange events or browser console logging. 
    4. Mouse Tracking: JavaScript dynamically tracks the mouse position to ensure that fake form fields align perfectly with user interactions, further improving the accuracy of the exploit. 

    In some test cases, login credentials and personal data were stolen with just two user clicks. The attack is particularly dangerous because it can bypass domain restrictions. For example, if a vulnerability exists on a subdomain of a large service, it can be exploited to steal credentials from that service’s main login domain. 

    While passkeys are generally considered more secure due to domain binding, Tóth found that several implementations—such as those from SK Telecom, Hanko, and Authsignal- could be hijacked via the same method. In systems lacking session-bound challenges, attackers can redirect or intercept signed assertions during the login process. 

    Vendor Responses 

    Following responsible disclosure in April 2025, several vendors released patches: 

    • Fixed: Dashlane, NordPass, Keeper, ProtonPass, RoboForm 
    • Still Vulnerable (as of August 2025): 1Password, Bitwarden, Enpass, iCloud Passwords, LastPass, LogMeOnce 

    Bitwarden, Enpass, and iCloud Passwords are reportedly working on fixes. However, both 1Password and LastPass have categorized the vulnerability as “informative,” suggesting they do not view it as a high-priority issue. 

    To reduce the risk of DOM‑based extension clickjacking, users should disable autofill, limit extension access to “on click,” and consider standalone password managers. Developers should implement protection like closed shadow DOMs and mutation observers, though no universal fix exists yet. With real-world demos showing how easily credentials, credit cards, and TOTP codes can be stolen, it’s clear that both users and vendors must act quickly; this is not a legacy issue, but a growing threat. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleApple Patches Zero-Day in iOS 18.6.2 After Targeted Exploits Involving Malicious Image Files
    Next Article Russia’s FSB-Linked Hackers Targeting Cisco Network Gear Used in Critical Infrastructure

    Related Posts

    Development

    Preserving Data Integrity with Laravel Soft Deletes for Recovery and Compliance

    August 22, 2025
    Development

    Quickly Generate Forms based on your Eloquent Models with Laravel Formello

    August 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Native vs hybrid vs cross-platform: Resolving the trilemma

    Tech & Work

    New PerfektBlue Attack Exposes Millions of Cars to Remote Hacking

    Security

    LWiAI Podcast #217 – ChatGPT Agent, Kimi k2, Hiring Drama

    Artificial Intelligence
    CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation

    CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation

    Development

    Highlights

    CVE-2025-46738 – Apache SEL arbitrary code execution vulnerability

    May 12, 2025

    CVE ID : CVE-2025-46738

    Published : May 12, 2025, 4:15 p.m. | 19 minutes ago

    Description : An authenticated attacker can maliciously modify layout data files in the SEL-5033 installation directory to execute arbitrary code.

    Severity: 6.6 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    ChatGPT Is Making People Think They’re Gods and Their Families Are Terrified

    May 9, 2025

    This new YouTube Shorts feature lets you circle to search videos more easily

    May 30, 2025

    Chrome to add Built-in Vertical Tabs, Catching Up with Edge and Firefox

    July 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.