
Sorcery or No?
Clicking a Link Can Hijack Your Account. Here’s What Happens
Many account hijacks don’t start with stolen passwords. They start with a single click that reuses trust your browser already holds. Understanding how that works makes the risk feel less like magic and more like mechanics.
For a lot of people, account takeovers still feel like witchcraft. You didn’t give anyone your password. You didn’t install anything sketchy. You just clicked a link. And somehow, your account got hijacked.
There’s no sorcery involved. It’s mostly about how modern logins work, and how much trust we hand off to browsers, email clients, and websites doing exactly what they were designed to do.
The Short Version
Most account hijacks that start with a link are not about guessing your password. They’re about stealing or reusing something your browser already has. A session. A token. A login flow that can be nudged just enough in the wrong direction.
Once that happens, the attacker doesn’t need to log in as you. They already are.
What Actually Happens When You Click
Most modern sites don’t ask for your password every time. After you log in once, your browser keeps a session token. Think of it as a temporary badge that says, this user already proved who they are.
When you click a malicious link, a few common things can go wrong. Sometimes the link sends you to a convincing login page that looks real enough. You enter your credentials. They go straight to the attacker. That part is familiar.
Some links are designed to capture session data instead. This can happen through malicious redirects, injected scripts, or abused OAuth flows where you are tricked into approving access you didn’t intend to grant.
In those cases, no password is stolen. The attacker just picks up the same badge your browser was already holding and reuses it somewhere else.
Why It Feels Invisible
Nothing breaks right away. You might not get logged out. You might not see a warning. From your side, everything still works.
Meanwhile, someone else can be reading emails, exporting data, changing settings, or setting up recovery options. They are not rushing. They are settling in.
This is why people often say, I never saw anything suspicious. From the user’s perspective, that can be completely true.
A Little History, Briefly
In the early days of the web, logging in meant typing a password almost every time. Sessions were short. Browsers remembered less. Hijacking an account usually meant breaking something obvious.
As the web got smoother, sessions got longer. Single sign-on became normal. One login unlocked many services. Convenience improved. The attack surface moved with it.
Why One Click Is Sometimes Enough
Clicking a link can be enough because the link is not asking for permission in the way people expect. It’s taking advantage of what’s already been granted.
Your browser trusts sites you’ve logged into. Sites trust tokens your browser presents. Attackers focus on slipping into that trust chain, not smashing it.
Once they do, the hardest part is already done.
What Actually Helps
- Be cautious with links that arrive when you are already logged into important accounts. Context matters more than urgency.
- Watch for unexpected permission screens, especially ones that ask to access data or manage your account.
- Log out of sensitive services when you are done using them, especially on shared or rarely restarted devices.
- Use account security pages to review active sessions and connected apps. Remove anything you do not recognize.
- Treat security emails about new logins or access changes as signals, not spam, even if nothing feels broken yet.
This isn’t about never clicking links. It’s about understanding that links don’t just take you somewhere. Sometimes, they change who gets to act as you.
Tags
Join the Discussion
Enjoyed this? Ask questions, share your take (hot, lukewarm, or undecided), or follow the thread with people in real time. The community’s open, join us.
Published February 1, 2026 • Updated February 1, 2026
published
Latest in Secure Habits
Right Now in Tech

Court Tosses Musk’s Claim That OpenAI Stole xAI Trade Secrets
Feb 26, 2026

Meta’s Age Verification Push Reignites Online Anonymity Debate
Feb 23, 2026

Substack Adds Polymarket Tools. Journalists Have Questions.
Feb 20, 2026

Netflix Ends Support for PlayStation 3 Streaming App
Feb 18, 2026

The Internet Archive Is Getting Caught in the AI Scraping War
Feb 5, 2026



