A Critical Google Cookies exploit involves manipulating or stealing user cookies, which store authentication information, to gain unauthorized access to accounts.
Hackers exploit this illicit mechanism to:-
A developer, PRISMA, discovered a major Google cookie exploit in Oct 2023 that allows persistent access post-password reset. A threat actor later integrated it into Lumma Infostealer, causing a ripple effect across malware groups.
Cybersecurity researchers at Cloudsek recently identified a new critical Google Cookies exploit that enables threat actors to persistently gain Google access after a password reset.
While researchers discovered this critical flaw by using “HUMINT,” and the root of the exploit has been discovered at “MultiLogin,” it’s an undocumented Google OAuth endpoint.
On Oct 20, 2023, CloudSEK’s XVigil found ‘PRISMA’ unveiling a potent 0-day solution for Google accounts on Telegram:
Malware reverses to target Chrome’s WebData token_service table that helps in extracting:-
Besides this, the table holds crucial columns like:-
Decryption uses Chrome’s Local State encryption key that is stored in the “UserData directory,” which mirrors the password encryption.
Chromium’s source code unveils the MultiLogin endpoint, an internal sync mechanism for Google accounts.
It aligns browser account states with Google’s authentication cookies for a consistent user experience. Besides this, several attempts were made to locate it using Google Dork, but all of them were unsuccessful.
The MultiLogin endpoint manages simultaneous sessions by accepting account IDs and auth-login tokens.
This undocumented MultiLogin endpoint, a crucial part of Google’s OAuth system, allows for the regeneration of cookies.
Lumma’s sophisticated approach involves encrypting the token: GAIA ID pair, blackboxing the exploit and adding secrecy to its core mechanics.
Black boxing serves two purposes, and here we have mentioned them:-
Lumma’s sophisticated exploit manipulates the token: GAIA ID pair, enabling continuous cookie regeneration for Google services. Alarming is its persistence post-password reset, which allows:-
Encrypting the key component signals a shift towards advanced, stealth-focused cyber threats, highlighting the stealth and protection of exploit methodologies in malware development.
Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently signed a technology partnership…
Hackers very frequently target the finance and insurance sectors due to the large volumes of sensitive data that they own.…
Tycoon 2FA, a recently emerged Phishing-as-a-Service (PhaaS) platform, targets Microsoft 365 and Gmail accounts, which leverage an Adversary-in-the-Middle (AitM) technique…
Logicalis, the global technology service provider delivering next-generation digital managed services, has today announced the launch of Intelligent Security, a…
Cacti, the widely utilized network monitoring tool, has recently issued a critical security update to address a series of vulnerabilities,…
Nmap's version 7.95 emerges as a testament to the relentless efforts of its development team, spearheaded by the renowned Gordon…