Multiple Information Stealers Exploit Zero-Day in Google’s Authentication Process to Persistently Compromise Accounts

In recent months, a concerning trend has emerged within the cybercriminal community – multiple information stealers have creatively exploited a vulnerability in Google’s authentication process. This exploit allows threat actors to exploit Google cookies and gain continuous access to user accounts, even if the victims change their passwords. This article delves into the details of this technique, its implications, and the actions taken by Google to mitigate the threat.

Technique for Restoring Google Cookies and Compromising Accounts Even After Password Change

Cyber attackers have discovered a method to regain control over compromised Google accounts, even if the victims change their passwords. This technique enables the persistent compromise of user accounts, posing significant risks to personal information and sensitive data.

Vulnerability in Google’s Authentication Process

The exploit revolves around an undisclosed vulnerability that some experts have labeled as a zero-day vulnerability. This vulnerability is related to the undocumented MultiLogin endpoint used for synchronizing accounts across Google services. When combined with account ID and tokens extracted from Chrome, it becomes a potent method for compromising accounts.

The term “zero-day” refers to a security vulnerability that is unknown to the software vendor, making it challenging to detect and patch promptly. In this case, the zero-day vulnerability allows threat actors to regenerate persistent Google cookies and gain continuous access to Google services.

The MultiLogin endpoint, when utilized in combination with the extracted tokens and account ID, acts as a catalyst for the regeneration of Google cookies. By leveraging this endpoint, threat actors can regain control over accounts and perpetuate their malicious activities.

Extraction and Decryption of Tokens

To gain access to the necessary tokens, the attackers extract the token-GAIA ID pair from Google. These tokens are then decrypted using an encryption key stored in Chrome’s Local State within the UserData directory. By successfully decrypting the tokens, threat actors acquire the means to recreate Google cookies.

Usage of Token-GAIA ID Pair with MultiLogin Endpoint

The malicious actors utilize the extracted token-GAIA ID pair alongside the MultiLogin endpoint to regenerate Google cookies. This intricate process guarantees persistent access, enabling them to compromise user accounts indefinitely.

Announcement of Discovery and Lumma’s Implementation

The discovery of this exploit was initially announced by a malware developer in October. By mid-November, the prominent infostealer family, Lumma, had already implemented this technique, solidifying its presence in the cybercrime landscape. To ensure exclusivity, Lumma encrypted the token-GAIA ID pair with its own keys, making it challenging for other malware families to utilize the same mechanism.

Adoption of the Technique by Other Infostealers

The success of the technique did not go unnoticed, as by the end of December, six other infostealer families were observed actively leveraging this new exploit. This widespread adoption further cemented the severity of the vulnerability and the threat it posed to user accounts and data.

Continued Effectiveness of the Exploit

One of the most alarming aspects of this exploit is its persistence even after users reset their passwords. This means that threat actors can continue to exploit compromised accounts, potentially going unnoticed by victims. Such long-lasting access could result in significant data breaches and compromise user privacy.

Actions Taken by Google to Secure Compromised Accounts

Recognizing the severity of the situation, Google has taken swift action to secure any compromised accounts detected. Users can invalidate stolen sessions simply by signing out of the affected browser. Additionally, Google provides the option to remotely revoke stolen sessions via the user’s devices page, ensuring that the exploit loses its potency.

With the adoption of a new technique that allows information stealers to continuously access compromised Google accounts, the need for heightened security measures is evident. Google’s prompt response and the ability for users to take action against compromised sessions are crucial steps in mitigating this threat. As cybercriminals continually seek new avenues for exploitation, remaining vigilant and adopting robust security practices are essential to protecting personal information and maintaining data privacy.

Explore more

Content Marketing Trends 2025: Trust, AI, and Data Storytelling

As the digital landscape continues to evolve, content marketing is undergoing significant transformations, paving the way for innovative strategies that prioritize trust, data storytelling, and artificial intelligence. A recent study by Statista, pulling insights from a survey of more than 300 marketing professionals in the United States, reveals that brands are adapting to this dynamic environment by focusing on new

How is Digitalization Revolutionizing Small Traders in Vietnam?

In Vietnam, digitalization has emerged as a transformative force reshaping the landscape for small traders and household businesses. The introduction of Government Decree No. 70/2025/ND-CP stands at the forefront of this digital wave, mandating that businesses in specific sectors earning over 1 billion VND annually adopt e-invoices integrated with cash registers. This change aligns with national efforts to formalize and

Is Digital Innovation Revolutionizing Indonesian Retail?

Indonesia’s retail sector is experiencing a profound transformation fueled by digital innovation and technological advancements, reshaping the landscape at an unprecedented pace. This revolution is marked by the integration of artificial intelligence (AI) and the implementation of omnichannel strategies that drive growth and enhance customer experiences. Industry leaders and experts gathered at the Retail Asia Summit – Indonesia to explore

Digital Transformation in UK Public Sector Faces Key Challenges

As the UK public sector seeks to navigate the complexities of digital transformation, notable obstacles have emerged, centering around digital literacy and leadership. Research conducted by Granicus has highlighted that a significant portion of public sector employees—25%—view a lack of digital literacy as a critical barrier to progress. While technological advancement remains a focal point, the importance of equipping individuals

How Is AI Revolutionizing Digital Marketing Strategies?

The Role of AI in Content Creation and Optimization In an era where digital content reigns supreme, AI plays a transformative role by not just enhancing but redefining content creation and optimization strategies. AI technologies facilitate the creation of personalized content that resonates with diverse audiences, transcending traditional group-based targeting. For example, email marketing campaigns that leverage AI can dynamically