Sunday, April 6, 2025
HomeCyber Security NewsNew Google Cookies Exploit Allows Access After Password Reset

New Google Cookies Exploit Allows Access After Password Reset

Published on

SIEM as a Service

Follow Us on Google News

A Critical Google Cookies exploit involves manipulating or stealing user cookies, which store authentication information, to gain unauthorized access to accounts. 

Hackers exploit this illicit mechanism to:-

  • Impersonate users
  • Hijack sessions
  • Gain control over sensitive information
  • Gain unauthorized access to websites 
  • Gain unauthorized access to applications

A developer, PRISMA, discovered a major Google cookie exploit in Oct 2023 that allows persistent access post-password reset. A threat actor later integrated it into Lumma Infostealer, causing a ripple effect across malware groups.

Cybersecurity researchers at Cloudsek recently identified a new critical Google Cookies exploit that enables threat actors to persistently gain Google access after a password reset.

While researchers discovered this critical flaw by using “HUMINT,” and the root of the exploit has been discovered at “MultiLogin,” it’s an undocumented Google OAuth endpoint.

Google Cookies Exploit

On Oct 20, 2023, CloudSEK’s XVigil found ‘PRISMA’ unveiling a potent 0-day solution for Google accounts on Telegram:

  • Session Persistence: Stays valid after a password change, bypassing security.
  • Cookie Generation: Creates valid cookies for uninterrupted access.

Malware reverses to target Chrome’s WebData token_service table that helps in extracting:-

  • Tokens
  • Account IDs
Structure of the token_service table
Structure of the token_service table (Source – Cloudsek)

Besides this, the table holds crucial columns like:-

  • GAIA ID (service)
  • Encrypted_token

Decryption uses Chrome’s Local State encryption key that is stored in the “UserData directory,” which mirrors the password encryption.

Chromium’s source code unveils the MultiLogin endpoint, an internal sync mechanism for Google accounts. 

Google’s chromium source code reveals parameter format, Data Format, and purpose
Google’s chromium source code reveals parameter format, Data Format, and purpose (Source – Cloudsek)

It aligns browser account states with Google’s authentication cookies for a consistent user experience. Besides this, several attempts were made to locate it using Google Dork, but all of them were unsuccessful.

The MultiLogin endpoint manages simultaneous sessions by accepting account IDs and auth-login tokens.

This undocumented MultiLogin endpoint, a crucial part of Google’s OAuth system, allows for the regeneration of cookies. 

Lumma’s sophisticated approach involves encrypting the token: GAIA ID pair, blackboxing the exploit and adding secrecy to its core mechanics.

Black boxing serves two purposes, and here we have mentioned them:-

  • Protection of the Exploit Technique
  • Evasion of Detection

Lumma’s sophisticated exploit manipulates the token: GAIA ID pair, enabling continuous cookie regeneration for Google services. Alarming is its persistence post-password reset, which allows:-

  • Prolonged account exploitation
  • Unnoticed account exploitation

Encrypting the key component signals a shift towards advanced, stealth-focused cyber threats, highlighting the stealth and protection of exploit methodologies in malware development.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...