OFFICIAL SECURITY BLOG

We’ve moved! You can now read the latest and greatest on Mac adware and malware at Malwarebytes.

Clipboard poisoning attacks on the Mac

Published June 3rd, 2016 at 7:33 AM EDT , modified June 3rd, 2016 at 7:33 AM EDT

Graham Cluley drew my attention the other day to an issue that has apparently been known to some for years, but was new to me: clipboard poisoning, an issue where a website can replace what you think is on your clipboard with something else.

Although this seems like an insignificant issue on first glance, it turns out that there are some very serious implications.

Read the full story on Malwarebytes Labs

3 Comments

  • Williamtug says:

    Thanks for the forum.Really thank you! Fantastic. Votraw

  • secureinfo says:

    Clipboard poisoning is made with flash : nor jquery, nor javascript nor HTML5 can interact with clipboard.

    So install Flashcontrol on your browser 😉

    • Thomas says:

      That’s not correct. Read the article, please. There were two clipboard poisoning attacks described. One used Javascript, the other HTML and CSS. Both work on a machine that doesn’t have Flash installed at all.

      Also, all browsers have their own plugin management features these days, which can control Flash nicely. Installing some third-party browser extension for this purpose is not needed or recommended.

This post is more than 90 days old and has been locked. No further comments are allowed.