• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
malware using google multilogin exploit to maintain access despite password

Malware Using Google MultiLogin Exploit to Maintain Access Despite Password Reset

You are here: Home / General Cyber Security News / Malware Using Google MultiLogin Exploit to Maintain Access Despite Password Reset
January 3, 2024

Details stealing malware are actively using edge of an undocumented Google OAuth endpoint named MultiLogin to hijack person periods and let continual access to Google expert services even right after a password reset.

In accordance to CloudSEK, the critical exploit facilitates session persistence and cookie technology, enabling risk actors to preserve access to a valid session in an unauthorized way.

The strategy was very first exposed by a danger actor named PRISMA on October 20, 2023, on their Telegram channel. It has given that been integrated into various malware-as-a-services (MaaS) stealer households, these kinds of as Lumma, Rhadamanthys, Stealc, Meduza, RisePro, and WhiteSnake.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The MultiLogin authentication endpoint is generally built for synchronizing Google accounts across services when buyers signal in to their accounts in the Chrome web browser (i.e., profiles).

A reverse engineering of the Lumma Stealer code has unveiled that the method targets the “Chrome’s token_support desk of WebData to extract tokens and account IDs of chrome profiles logged in,” security researcher Pavan Karthick M explained. “This desk includes two important columns: company (GAIA ID) and encrypted_token.”

Google MultiLogin Exploit

This token:GAIA ID pair is then mixed with the MultiLogin endpoint to regenerate Google authentication cookies.

When attained for remark, Google acknowledged the existence of the attack approach but mentioned that customers can revoke the stolen sessions by logging out of the impacted browser.

“Google is conscious of modern stories of a malware relatives stealing session tokens,” the business explained to The Hacker News. “Attacks involving malware that steal cookies and tokens are not new we routinely upgrade our defenses in opposition to this kind of tactics and to protected end users who fall target to malware. In this occasion, Google has taken motion to safe any compromised accounts detected.”

Cybersecurity

“Nevertheless, it is really essential to be aware a false impression in reviews that suggests stolen tokens and cookies are not able to be revoked by the consumer,” it even more added. “This is incorrect, as stolen classes can be invalidated by basically signing out of the affected browser, or remotely revoked by way of the user’s gadgets page. We will continue on to check the predicament and deliver updates as essential.”

The company even further advised people switch on Enhanced Secure Searching in Chrome to safeguard versus phishing and malware downloads.

Located this write-up exciting? Follow us on Twitter  and LinkedIn to read through more exclusive content material we post.


Some sections of this post are sourced from:
thehackernews.com

Previous Post: «5 ways to reduce saas security risks 5 Ways to Reduce SaaS Security Risks
Next Post: Mandiant’s Twitter Account Restored After Six-Hour Crypto Scam Hack mandiant's twitter account restored after six hour crypto scam hack»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.