Case Study 1: Social Media LikeJacking Scam
Background
A popular social media platform saw a sudden increase in suspicious “Likes” on random pages. Users complained that they never clicked “Like,” yet their profile was promoting unknown pages.
What Happened
Attackers created a website offering “Watch Free Movies.”
A big orange Play button appeared on the page.
But behind that button, a hidden Facebook Like button was placed using a transparent iframe.
When users clicked Play → they unknowingly liked a spam page.
Impact
-
Thousands of users unknowingly boosted fake pages
-
The spam pages gained followers quickly
-
Those pages later spread phishing and scam links
Lesson
Simple UI manipulation can trick even experienced users. Social media platforms must ensure critical actions (like, share, follow) cannot be executed inside frames.
Case Study 2: Online Banking Clickjacking Fraud
Background
A regional bank noticed several customers reporting unauthorized fund transfers. Yet, no malware was found on their devices.
What Happened
Attackers sent phishing emails leading users to a fake “Account Verification” site.
This site displayed a normal verification button.
Underneath it, a transparent iframe was loaded containing the bank’s real “Transfer Funds” page—with the transfer amount and recipient pre-filled.
When users clicked “Verify,” they actually clicked the “Confirm Transfer” button inside the hidden frame.
Impact
-
Money was transferred to attacker-controlled accounts
-
Victims believed it was a bank error
-
The bank had to reimburse customers and upgrade its security
Lesson
Banks must enforce X-Frame-Options: DENY and CSP frame-ancestors 'none'; to prevent their pages from being embedded anywhere.
Case Study 3: Ecommerce Subscription Hijack
Background
A major ecommerce store received customer complaints about being subscribed to paid monthly services without their consent.
What Happened
A discount coupon website placed a hidden iframe over a fake “Get 80% Off Coupon” button.
That iframe contained the ecommerce website’s Subscribe button for a paid service.
When visitors clicked the coupon button → the click triggered the hidden subscribe action.
Impact
-
Hundreds of users accidentally subscribed
-
Customers demanded refunds
-
The ecommerce site suffered reputation damage
Lesson
Websites with financial or subscription actions should never allow their pages to be framed by external domains. Proper security headers prevent this entire attack.
References for Case Study 1: Social Media LikeJacking Scam
-
OWASP Foundation – Clickjacking & Likejacking Attacks
https://owasp.org/www-community/attacks/Clickjacking -
Facebook Security Notes – Protection Against Likejacking
https://www.facebook.com/security -
Kaspersky – Social Media Scams and Clickjacking Techniques
https://www.kaspersky.com/resource-center/threats
References for Case Study 2: Online Banking Clickjacking Fraud
-
PortSwigger Web Security Academy – Clickjacking and UI Redressing Attacks
https://portswigger.net/web-security/clickjacking -
CISA – Banking and Financial Sector Cybersecurity Threats
https://www.cisa.gov/news-events -
Imperva – How Clickjacking Is Used in Financial Fraud
https://www.imperva.com/learn/application-security/clickjacking/
References for Case Study 3: Ecommerce Subscription Hijack
-
OWASP – Clickjacking Defense Cheat Sheet (E-commerce Risks)
https://owasp.org/www-community/attacks/Clickjacking -
Venafi Security Blog – How Clickjacking Impacts Online Stores
https://www.venafi.com/blog -
Norton Security – Online Shopping Risks and Hidden UI Attacks
https://us.norton.com/internetsecurity

Good blog
ReplyDelete