Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Password Managers Vulnerable to Data Theft via Clickjacking

Posted on August 21, 2025August 21, 2025 By CWS

A researcher has examined practically a dozen password managers and located that they had been all weak to clickjacking assaults that might result in the theft of extremely delicate knowledge.

The analysis was performed by Marek Tóth and it was offered earlier this month on the DEF CON convention. The researcher has now additionally printed a weblog publish detailing his findings.

The researcher focused 1Password, Bitwarden, Dashlane, Enpass, Keeper, LastPass, LogMeOnce, NordPass, ProtonPass, RoboForm, and Apple’s iCloud Passwords, particularly their related browser extensions. 

These browser extensions are very fashionable. An evaluation by the researcher discovered that they’ve a complete of practically 40 million lively installations, primarily based on knowledge from the official browser extension repositories for Chrome, Edge and Firefox. 

Clickjacking is an assault method by which the attacker methods the focused consumer into clicking on hidden parts on an online web page. The attacker units up an internet site that accommodates malicious buttons or different parts which can be clear and positioned on prime of harmless-looking parts on the web page. When the sufferer visits the attacker’s web site and interacts with these harmless-looking parts, they’re truly clicking on the malicious ingredient, unknowingly finishing up harmful actions. 

Tóth confirmed how an attacker can use DOM-based extension clickjacking and the autofill performance of password managers to exfiltrate delicate knowledge saved by these functions, together with private knowledge, usernames and passwords, passkeys, and cost card data. 

The assaults demonstrated by the researcher require 0-5 clicks from the sufferer, with a majority requiring just one click on on a harmless-looking ingredient on the web page. The one-click assaults usually concerned exploitation of XSS or different vulnerabilities. 

DOM, or Doc Object Mannequin, is an object tree created by the browser when it hundreds an HTML or XML net web page. It permits JavaScript and different scripting languages to work together with and alter the web page, together with conceal parts, modify textual content, or add new content material dynamically.Commercial. Scroll to proceed studying.

Tóth’s assault entails a malicious script that manipulates consumer interface parts injected by browser extensions into the DOM. “The precept is {that a} browser extension injects parts into the DOM, which an attacker can then make invisible utilizing JavaScript,” he defined.

In line with the researcher, a few of the distributors have patched the vulnerabilities, however fixes haven’t been launched for Bitwarden, 1Password, iCloud Passwords, Enpass, LastPass, and LogMeOnce. 

SecurityWeek has reached out to those firms for remark. Bitwarden mentioned a repair for the vulnerability is being rolled out this week with model 2025.8.0. LogMeOnce mentioned it’s conscious of the findings and its workforce is actively engaged on resolving the difficulty by a safety replace.

1Password and LastPass have shared extra context on the difficulty from the attitude of password supervisor builders. 

Jacob DePriest, CISO at 1Password, identified that clickjacking is a long-standing net assault method that impacts web sites and browser extensions broadly. 

“As a result of the underlying concern lies in the best way browsers render webpages, we consider there’s no complete technical repair that browser extensions can ship on their very own,” DePriest instructed SecurityWeek.

“We take this and all safety considerations severely, and our method to this explicit danger is to concentrate on giving clients extra management. 1Password already requires affirmation earlier than autofilling cost data, and in our subsequent launch, we’re extending that safety so customers can select to allow affirmation alerts for different kinds of knowledge. This helps customers keep knowledgeable when autofill is going on and in command of their knowledge,” he added.

Alex Cox, Director of Risk Intelligence, Mitigation, Escalation (TIME) at LastPass, additionally famous that Tóth’s analysis “highlights a broader problem dealing with all password managers: placing the fitting steadiness between consumer expertise and comfort, whereas additionally addressing evolving risk fashions.”

“LastPass has carried out sure clickjacking safeguards, together with a pop-up notification that seems earlier than auto-filling bank cards and private particulars on all websites, and we’re dedicated to exploring methods to additional shield customers whereas persevering with to protect the expertise our clients count on,” Cox defined. 

He added, “Within the meantime, our [TIME] workforce encourages all customers of password managers to stay vigilant, keep away from interacting with suspicious overlays or pop-ups, and hold their LastPass extensions updated.”

Associated: Passkey Login Bypassed through WebAuthn Course of Manipulation

Associated: Main Enterprise AI Assistants Can Be Abused for Information Theft, Manipulation

Security Week News Tags:Clickjacking, Data, Managers, Password, Theft, Vulnerable

Post navigation

Previous Post: UNC5518 Group Hacks Legitimate Websites to Inject Fake Captcha That Tricks Users to Execute Malware
Next Post: Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy

Related Posts

Seal Security Raises $13 Million to Secure Software Supply Chain Security Week News
Exploited Vulnerability Impacts Over 80,000 Roundcube Servers Security Week News
Google’s $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report Security Week News
Hundreds of N-able N-central Instances Affected by Exploited Vulnerabilities Security Week News
Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware Security Week News
161,000 People Impacted by Krispy Kreme Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files
  • Warlock Ransomware Exploiting SharePoint Vulnerabilities to Gain Access and Steal Credentials
  • Scattered Spider Hacker Sentenced to Prison
  • Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy
  • Password Managers Vulnerable to Data Theft via Clickjacking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telecom Firm Colt Confirms Data Breach as Ransomware Group Auctions Files
  • Warlock Ransomware Exploiting SharePoint Vulnerabilities to Gain Access and Steal Credentials
  • Scattered Spider Hacker Sentenced to Prison
  • Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy
  • Password Managers Vulnerable to Data Theft via Clickjacking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News