The attacker frames a target site under a look-alike page.
They hide or offset the real controls (opacity, tiny iframes, CSS).
Your click lands on the target site: follow, purchase, enable camera, change settings, etc.
Buttons don’t do what they should, or a click triggers an unrelated action
Tiny delays before something happens, as if layers were loading
Cursor changes or focus jumps to a different part of the page
If a page looks sketchy, don’t click—scroll or reload.
Use Content Security/Privacy tools that block third-party frames and trackers.
Keep your browser updated; modern protections help.
For admins: set X-Frame-Options: DENY or CSP frame-ancestors 'none' on sensitive pages.
Close the tab, clear site data for that domain, and sign out/in again.
Review account settings/permissions (camera/mic, follows, subscriptions).
Turn on MFA so one bad click can’t take over your account.