DoubleClickjacking: A New type of web hacking technique
Understanding the “DoubleClickjacking” Technique
- Core idea: get the user to commit to two clicks.
- First click is on an overlaid fake UI (e.g., “double‑click here” / CAPTCHA / form button).
- That overlay closes after the first click, so the second click lands on a sensitive button beneath (e.g., OAuth “Allow”).
- Variants discussed:
- Doesn’t need literal “double‑click” wording; could be “click once, then confirm.”
- Possible adaptation using keyboard+mouse (e.g., command-click listening to keydown).
- Could be wrapped in rage‑click scenarios or clicker‑style CAPTCHAs.
How Common Is Double‑Clicking on the Web?
- One side: double‑clicking on websites is “extremely uncommon” and feels suspicious.
- Others strongly disagree, citing:
- Less‑technical users who double‑click almost everything, often due to poor understanding of focus.
- Habits transferred from desktop file explorers.
- Frustration with slow UIs leading to repeated clicks.
- Real uses like Google Drive folder navigation, text selection, and layout shifts on sites like YouTube.
- Worn or faulty mice that emit accidental double‑clicks are mentioned as another real‑world source.
Feasibility, Timing, and Preloading
- Concern: exploit seems to rely on near‑instant page loads.
- Counterpoints:
- Attacker can preload target pages in background tabs.
- The visible page can delay the “now click again” step until it detects the target is ready, e.g., via a loading spinner.
- Some viewers found the demo unclear and questioned whether it showed a real compromise or just normal auth flows.
Novelty and Relationship to Existing Attacks
- Multiple comments frame this as a variant of long‑known clickjacking/UI‑redressing tricks (bait‑and‑switch clicks, bouncing ads, etc.), not fundamentally new.
- Reference to prior clickjacking against major sites and related CAPTCHA‑style social engineering.
Proposed Mitigations
- Site/app level:
- Disable critical buttons when the tab is hidden; re‑enable only after a short delay when visible/focused.
- Add confirmations/CAPTCHAs for high‑risk actions.
- Avoid taking actions immediately after layout shifts.
- Browser/UX level:
- Suggestion to ignore clicks for a short time after focus changes or when UI elements newly appear or move.
- Firefox dialogs delaying button activation cited as partial prior art, though some fear impact on power users.
Broader Security & UX Themes
- Criticism of popups/tabs being able to rearrange window layouts, though some argue this exists for legacy web‑app workflows.
- Several participants mitigate risk personally by disabling JavaScript by default, using NoScript/uBlock, or Firefox containers.
- Irony noted that the article page itself uses intrusive smooth scrolling/scrolljacking, which many find unusable or motion‑inducing.