"Malware Exploits Google OAuth to Hijack Accounts and Steal Information"

TL;DR Summary
A new malware exploits a vulnerability in Google Chrome to steal session tokens and create persistent cookies, allowing attackers to access Google Accounts even after password changes. Google has responded by securing compromised accounts and clarifying that users can invalidate stolen sessions by signing out. The company recommends users to remove any malware, turn on Enhanced Safe Browsing, and avoid installing unfamiliar software. Despite Google's countermeasures, multiple malware groups claim to have adapted to these defenses.
Topics:technology##cookietheft#cyberattack#enhancedsafebrowsing#googleaccountsecurity#malware#technology-cybersecurity
- New malware restores cookies to break into your Google Account [U: Google responds] 9to5Google
- Google password resets not enough to stop these info-stealing malware strains The Register
- Malware abuses Google OAuth endpoint to ‘revive’ cookies, hijack accounts BleepingComputer
- Attackers Abuse Google OAuth Endpoint to Hijack User Sessions - Attackers Abuse Google OAuth Endpoint to Hijack User Sessions DARKReading
- Malware exploits undocumented Google OAuth endpoint to regenerate Google cookies Security Affairs
Reading Insights
Total Reads
0
Unique Readers
1
Time Saved
2 min
vs 3 min read
Condensed
84%
474 → 76 words
Want the full story? Read the original article
Read on 9to5Google