Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Malware exploits Google MultiLogin vulnerability to maintain access despite password reset
    Cyber Security

    Malware exploits Google MultiLogin vulnerability to maintain access despite password reset

    techempireBy techempire2 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 3, 2024Editorial DepartmentMalware/data theft

    Google multiple login vulnerability

    Information-stealing malware is actively exploiting an undocumented Google OAuth endpoint called MultiLogin to hijack user sessions and allow continued access to Google services even after a password reset.

    According to CloudSEK, the critical vulnerability facilitates session persistence and cookie generation, allowing threat actors to maintain access to valid sessions in an unauthorized manner.

    This technique was first revealed by a threat actor named PRISMA on October 20, 2023 on their Telegram channel. It has since been incorporated into various malware-as-a-service (MaaS) stealth program families, such as Lumma, Rhadamanthys, Stealc, Meduza, RisePro, and WhiteSnake.

    Internet security

    The MultiLogin authentication endpoint is primarily designed to sync Google Accounts across services when a user logs into their account (i.e. profile) in the Chrome web browser.

    Security researcher Pavan Karthick M said that reverse engineering of the Lumma Stealer code revealed that the technique targets “Chrome’s WebData token_service table to extract the token and account ID of the logged-in Chrome profile.” “This table contains two key columns: service (GAIA ID) and cryptographic token.”

    Google multiple login vulnerability

    Then, combine this token:GAIA ID pair with the MultiLogin endpoint to regenerate the Google authentication cookie.

    When contacted for comment, Google acknowledged the existence of this attack method but noted that users can revoke stolen sessions by exiting the affected browser.

    “Google is aware of recent reports of a malware family stealing session tokens,” the company told The Hacker News. “Attacks involving cookie and token-stealing malware are not new; we regularly update our capabilities to target these types of techniques. defensive measures and to protect users who fell victim to malware. In this case, Google has taken action to protect any compromised accounts detected.”

    Internet security

    “However, it is important to note a misconception in the report, namely that users cannot revoke stolen tokens and cookies,” it further added. “This is incorrect, as stolen sessions can be invalidated simply by exiting the affected browser, or revoked remotely via the user’s device page. We will continue to monitor the situation and provide updates as needed.”

    The company further recommends that users turn on the enhanced Safe Browsing feature in Chrome to prevent phishing and malware downloads.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.