"New Malware Exploits Google OAuth to Hijack Accounts Despite Password Changes"

TL;DR Summary
A new malware exploit targets Google Chrome to extract and decrypt login tokens, allowing attackers to create persistent Google cookies for account access, even after password changes. The vulnerability, which has been sold by multiple malware groups since mid-November, can bypass traditional security measures like password resets and potentially two-factor authentication. Users are advised to avoid installing unfamiliar software to prevent such malware infections.
Topics:technology##chromeexploit#cookievulnerability#googleaccountsecurity#malware#technology-cybersecurity#twofactorauthentication
- New malware restores cookies to break into your Google Account 9to5Google
- Google accounts may be vulnerable to new hack, changing password won’t help CyberNews.com
- Malware abuses Google OAuth endpoint to ‘revive’ cookies, hijack accounts BleepingComputer
- PRISMA's Cat and Mouse Game - Cracking Google's MultiLogin Mystery Digital Information World
- Malware Leveraging Google Cookie Exploit via OAuth2 Functionality HackRead
Reading Insights
Total Reads
0
Unique Readers
1
Time Saved
1 min
vs 2 min read
Condensed
78%
288 → 64 words
Want the full story? Read the original article
Read on 9to5Google