Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Unlocking cybersecurity’s hidden defenders to preempt cyber vulnerabil...
Have cybercriminals been increasingly targeting human touchpoints from...
Blockchain exploits highlight cross-chain security flaws
Data protection challenges in the agentic workspace
Bitsight Reports 50% Growth in APAC Amid Rising Demand for Cyber Risk ...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Unlocking cybersecurity’s hidden defenders to preempt cyber vulnerabilities

      Unlocking cybersecurity’s hidden defenders to preempt cyber vulnerabilities

      Saturday, November 22, 2025, 8:17 AM Asia/Singapore | Features, Newsletter
    • Featured

      Blockchain exploits highlight cross-chain security flaws

      Blockchain exploits highlight cross-chain security flaws

      Friday, November 21, 2025, 10:30 AM Asia/Singapore | Features
    • Featured

      What happened with Cloudflare?

      What happened with Cloudflare?

      Wednesday, November 19, 2025, 11:35 AM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

News

DOM-based clickjacking could hack browser password manager extensions to steal data

By CybersecAsia editors | Tuesday, August 26, 2025, 4:44 PM Asia/Singapore

DOM-based clickjacking could hack browser password manager extensions to steal data

Attackers can exploit invisible elements in these password manager modules, and many of the latter are yet to be patched.

Just when people around the world have just found a suitable password manager to cope with password hygiene, a new security vulnerability has been disclosed affecting widely used password manager browser extensions.

The vulnerability could potentially expose millions of users to credential and data theft.

According to independent researcher Marek Tóth, this is a Document Object Model (DOM)-based extension clickjacking flaw, which targets how browser add-ons handle auto-fill prompts by manipulating UI elements in a way that is invisible to the user.

Clickjacking, also known as UI redressing, tricks people into taking actions they did not intend, such as clicking on harmless-looking buttons that actually perform malicious operations. In this new variant:

  • Attackers deploy scripts on malicious web pages to make injected password manager UI components — such as login prompts — fully transparent.
  • When a user attempts to interact with benign-seeming elements (such as closing a pop-up), they could unknowingly trigger their password manager to auto-fill credentials on an embedded, invisible form.
  • This data, including login credentials, credit card information, and two-factor codes, can then be silently captured and sent to a remote attacker.

Tóth tested 11 major password managers and found that nearly all of them were vulnerable to this technique. In many cases, the password managers auto-filled stored data into forms not only on the main domain but also across all subdomains, which could be further exploited if other site vulnerabilities exist.

According to the findings, 10 out of 11 extensions had allowed DOM-based credential theft; nine had permitted two-factor code exfiltration; and eight were able be manipulated for passkey attacks.

Despite vendors being notified, six affected password managers have yet to release patches. Experts advise users to disable auto-fill in password managers or set browser extension permissions to “on click” for greater control over credential input until comprehensive fixes are deployed.

Share:

PreviousLRQA Ignites Cybersecurity Conversations at CISO Singapore 2025
NextCISOs can navigate emerging risks from autonomous AI with a new security framework

Related Posts

Patches for zero day vulnerabilities, bugs released just two days after iOS16 launch

Patches for zero day vulnerabilities, bugs released just two days after iOS16 launch

Wednesday, September 14, 2022

State-sponsored threat actors step up activities in four vectors: report

State-sponsored threat actors step up activities in four vectors: report

Thursday, August 29, 2024

Fewer SE Asia ransomware attacks, but more targeted APT attacks in H1

Fewer SE Asia ransomware attacks, but more targeted APT attacks in H1

Friday, September 4, 2020

A convoluted new twist to phishing using Sharepoint and One Note

A convoluted new twist to phishing using Sharepoint and One Note

Friday, September 4, 2020

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Meeting the business resilience challenges of digital transformation

    Meeting the business resilience challenges of digital transformation

    Data proves to be key to driving secure and sustainable digital transformation in Southeast Asia.Read more
  • Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank

    Upgrading biometric authentication system protects customers in the Philippines: UnionDigital Bank

    An improved dual-liveness biometric framework can counter more deepfake threats, ensure compliance, and protect underbanked …Read more
  • HOSTWAY gains 73% operational efficiency for private cloud operations  

    HOSTWAY gains 73% operational efficiency for private cloud operations  

    With NetApp storage solutions, the Korean managed cloud service provider offers a lean, intelligent architecture, …Read more
  • CISOs can navigate emerging risks from autonomous AI with a new security framework

    CISOs can navigate emerging risks from autonomous AI with a new security framework

    See how security leaders can adopt layered strategies addressing intent, governance, and oversight to manage …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.