top of page
Search

Clickjacking and Password Managers: What Startups Need to Know

Password managers are a great tool. They help teams avoid reusing weak passwords, keep track of dozens (sometimes hundreds) of logins, and even store two-factor codes or payment details. But like any tool, they’re not perfect. In a recent article, researchers from The Hacker News showed that a number of popular password managers can be tricked into handing over credentials through a technique called clickjacking.


If you lead a startup or scale-up, this isn’t a reason to panic. It’s a reminder to make small adjustments that can lower your risk and help your team avoid common traps.


What the Vulnerability Looks Like

Clickjacking is a simple idea. A malicious website hides invisible fields or buttons on top of what looks like a normal page. When someone clicks, they may think they’re closing a popup or agreeing to something minor, but in reality, they’re clicking on a hidden form.


With password managers, this can mean the hidden form is autofilled with sensitive information. Login details, two-factor codes, or even stored payment card information could be exposed.


Researchers tested a wide range of popular tools and found that most were affected in some way. Vendors are now releasing updates, but the safest option is to change how you use autofill in the meantime.


Practical Steps You Can Take


1. Disable Autofill

Go into your password manager’s settings and switch off the “autofill” or “inline autofill” feature. Instead, use manual options such as copy-and-paste, right-click menus, or keyboard shortcuts. It adds a tiny bit of friction but shuts down this type of attack.


2. Stay Alert to Phishing Links

Clickjacking often pairs well with phishing. An attacker sends you a link by email, text, or chat. The page looks legitimate but contains hidden elements designed to trick autofill. Encourage your team to:

  • Pause before clicking on links in unexpected emails.

  • Hover over links to see the real destination.

  • When in doubt, type the website address manually instead of clicking.


3. Keep Password Managers Updated

Most vendors are already working on fixes. Updates are being released gradually, so make sure your extensions and apps are kept up to date.


4. Use Separation Where Possible

Consider whether your team should store everything in the same place. Separating high-value items can reduce the impact if one tool is ever compromised.


Why This Matters for Startups

Startups often rely heavily on password managers because they don’t have a full security team or complex identity solutions in place. That’s fine, it’s still one of the best tools available. But it also means that if something goes wrong, there isn’t a backup process to catch it.


By adding small steps like disabling autofill and reinforcing phishing awareness, you reduce the chance of a single mistake turning into a breach.


Conclusion

Clickjacking isn’t new, but seeing it work against password managers is a useful reminder. Security is less about buying the “perfect” tool and more about making sensible choices in how you use them.


If you’re a founder or operations lead and this raises questions about how your team handles passwords, it might be worth a short workshop or a security health check. At Steel FYI, we keep advice straightforward and practical,so your business can stay focused on growth, not firefighting.


 
 
 

Recent Posts

See All

Comments


© 2022-2025 Steel FYI. All rights reserved.

Vanta Partner badge
Drata Badge

Follow us on social media for the latest cyber security news and tips.

  • LinkedIn
  • White Twitter Icon
  • White YouTube Icon
trustpilot logo
bottom of page