IsThisAScam
HomeBlogPrijzenOver OnsHistoryAPIExtension
Upgrade
NL
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Product
  • Home
  • Blog
  • Pricing
  • Over Ons
  • History
  • Chrome Extension
Resources
  • Developers
  • API-documentatie
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Juridisch
  • Privacybeleid
  • Servicevoorwaarden
  • product@zeplik.com

© 2026 Zeplik, Inc. Alle rechten voorbehouden.

Built for the calm, the cautious, and the careful.

Home/Glossary/Clickjacking
Glossary · Attack Vector

What Is Clickjacking?

A deceptive technique where an attacker tricks a user into clicking on something different from what they see, by layering invisible or disguised elements over a legitimate web page.

Quick Definition

A deceptive technique where an attacker tricks a user into clicking on something different from what they see, by layering invisible or disguised elements over a legitimate web page.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Clickjacking explained.

Clickjacking, also known as a "UI redress attack," makes users believe they're clicking a legitimate button when they're actually clicking on a hidden element controlled by the attacker. The technique uses transparent iframes layered over visible content.

This can lead to unintended actions: enabling a webcam, sharing personal data, clicking "Like" on a Facebook page, downloading malware, or making a purchase. The victim believes they clicked a harmless button while actually triggering a completely different action.

While less commonly associated with traditional scams, clickjacking is used in social engineering, ad fraud, and unauthorized data collection. It demonstrates how attackers exploit the gap between what users see and what actually happens.

02How it works.

01The attacker creates a web page with an invisible iframe containing a target website
02The visible content shows a decoy (e.g., "Click here to play video")
03The invisible iframe is positioned so the target's button aligns with the visible decoy
04When the user clicks the decoy, they actually click the hidden button on the real site
05The unintended action is executed: permissions granted, purchases made, or data shared

03Real-world example.

A clickjacking attack targeted Facebook users by showing a "Watch this video" button that was actually aligned with Facebook's hidden "Like" button. Users unknowingly liked scam pages, which then appeared in their friends' feeds, spreading the scam virally.

04How to protect yourself.

01Keep your browser updated — modern browsers have built-in clickjacking protections
02Use browser extensions that detect and block invisible iframes
03Be cautious when visiting unfamiliar websites that prompt you to click buttons
04Website developers should implement X-Frame-Options and Content-Security-Policy headers
05Log out of sensitive accounts when browsing untrusted sites
Related Terms
Dark PatternSocial EngineeringPhishing
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →