"New Malware Bypasses Password Changes by Exploiting Google OAuth to Hijack Accounts"

1 min read
Source: Security Affairs
"New Malware Bypasses Password Changes by Exploiting Google OAuth to Hijack Accounts"
Photo: Security Affairs
TL;DR Summary

CloudSEK researchers have reverse-engineered a zero-day exploit that leverages an undocumented Google OAuth endpoint, 'MultiLogin,' to regenerate persistent Google cookies even after password resets. Initially discovered by a developer named PRISMA, the exploit has been used by various malware, including Lumma Infostealer and White Snake, to maintain access to Google services. The exploit manipulates token:GAIA ID pairs extracted from Chrome's token_service table, allowing attackers to persistently exploit user accounts. Google has not yet confirmed the exploitation of this vulnerability.

Share this article

Reading Insights

Total Reads

0

Unique Readers

1

Time Saved

1 min

vs 2 min read

Condensed

79%

37579 words

Want the full story? Read the original article

Read on Security Affairs