Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New SVG Clickjacking Attack Let Attackers Create Interactive Clickjacking Attacks

Posted on December 4, 2025December 4, 2025 By CWS

Clickjacking has lengthy been thought-about a “dumb” assault within the cybersecurity world. Historically, it entails putting an invisible body over a reputable web site to trick a consumer into clicking a button they didn’t intend to, like masking a “Delete Account” button with a faux “Play Video” overlay.

Nonetheless, a safety researcher referred to as Lyra has unveiled a classy new method dubbed “SVG clickjacking” that essentially adjustments the risk panorama.

A safety researcher has unveiled a novel exploitation method that essentially transforms how clickjacking assaults function, turning them from easy “hidden button” tips into complicated, interactive exploits able to studying display screen content material and executing logic.

Dubbed “SVG clickjacking” by its discoverer, the researcher referred to as Lyra (or rebane2001), the method leverages Scalable Vector Graphics (SVG) filters to create “sensible” overlays that may detect and reply to the state of a goal web site.

SVG Clickjacking Overlay (Supply: Lyra)

In contrast to conventional clickjacking, the place attackers merely overlay an invisible iframe to trick customers into clicking a button, this new technique permits the assault web page to “learn” pixels from the sufferer website and alter its personal interface based mostly on what the consumer sees.​

SVG Clickjacking Illustration (Supply: Cybersecuritynews)

SVG Clickjacking Assault

The core of the vulnerability lies in the way in which fashionable browsers course of SVG filters corresponding to feDisplacementMap, feColorMatrix, and feComposite. Whereas these instruments are designed for graphical results like refractions or shade shifts, Lyra demonstrated that they are often repurposed to carry out logical operations.​

By chaining these filters collectively, an attacker can construct functioning logic gates (AND, OR, XOR) instantly throughout the browser’s rendering engine. This successfully turns the SVG filter right into a primitive pc that may monitor a cross-origin iframe.

For instance, an assault might detect if a particular dialog field has appeared, if a checkbox is checked, or if purple error textual content is seen, after which dynamically replace the faux overlay to information the consumer by a multi-step course of.​

Lyra demonstrated the method’s severity with a proof-of-concept assault towards Google Docs, which earned a $3,133.70 bounty from Google’s Vulnerability Reward Program.

Within the demo, the attacker tricked a consumer into producing a doc, typing a faux “captcha” right into a textual content field (which was really a Google Docs enter area), and clicking by a sequence of buttons.​

The assault was notable as a result of it required the overlay to react to the doc’s state, hiding the faux enter field as soon as the consumer had efficiently “typed” the captcha, and displaying a brand new button solely when the doc was prepared.

“Up to now, particular person elements of such an assault might’ve been pulled off by conventional clickjacking… however the complete assault would’ve been method too lengthy and complicated to be real looking,” Lyra wrote.​

Maybe essentially the most hanging software of SVG clickjacking is its means to exfiltrate information. The researcher confirmed how the method might learn delicate pixels from a goal website and encode that information right into a URL, which is then rendered as a scannable QR code utilizing the feDisplacementMap filter.​

This creates a situation the place an attacker might immediate a consumer to “scan this code to confirm you’re human,” whereas the code really accommodates a URL with their stolen session information or non-public data embedded within the parameters.​

This analysis marks a major escalation in “UI redress” assaults. By proving that SVG filters can act as a side-channel to learn cross-origin pixels and execute logic, the analysis means that merely counting on visible obscurity is not a adequate protection towards clickjacking.

As Lyra famous, the method permits for assaults which can be “interactive” and “responsive,” bypassing the blind guesswork that beforehand restricted the affect of such exploits.​

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attack, Attackers, Attacks, Clickjacking, Create, Interactive, SVG

Post navigation

Previous Post: CISA Warns of OpenPLC ScadaBR File Upload Vulnerability Exploited in Attacks
Next Post: Corporate Users 3x More Likely Targeted by Phishing Than Malware – SpyCloud Report

Related Posts

Ransomware Negotiation When and How to Engage Attackers Cyber Security News
ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials Cyber Security News
Snake Keyloggers Abuse Java Utilities to Evade Security Tools Cyber Security News
A Free Zero Trust Web Application Firewall for 2026 Cyber Security News
Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware Cyber Security News
GitGuardian Launches MCP Server to Bring Secrets Security into Developer Workflows Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark