Multiple Information Stealers Exploit Zero-Day in Google’s Authentication Process to Persistently Compromise Accounts

In recent months, a concerning trend has emerged within the cybercriminal community – multiple information stealers have creatively exploited a vulnerability in Google’s authentication process. This exploit allows threat actors to exploit Google cookies and gain continuous access to user accounts, even if the victims change their passwords. This article delves into the details of this technique, its implications, and the actions taken by Google to mitigate the threat.

Technique for Restoring Google Cookies and Compromising Accounts Even After Password Change

Cyber attackers have discovered a method to regain control over compromised Google accounts, even if the victims change their passwords. This technique enables the persistent compromise of user accounts, posing significant risks to personal information and sensitive data.

Vulnerability in Google’s Authentication Process

The exploit revolves around an undisclosed vulnerability that some experts have labeled as a zero-day vulnerability. This vulnerability is related to the undocumented MultiLogin endpoint used for synchronizing accounts across Google services. When combined with account ID and tokens extracted from Chrome, it becomes a potent method for compromising accounts.

The term “zero-day” refers to a security vulnerability that is unknown to the software vendor, making it challenging to detect and patch promptly. In this case, the zero-day vulnerability allows threat actors to regenerate persistent Google cookies and gain continuous access to Google services.

The MultiLogin endpoint, when utilized in combination with the extracted tokens and account ID, acts as a catalyst for the regeneration of Google cookies. By leveraging this endpoint, threat actors can regain control over accounts and perpetuate their malicious activities.

Extraction and Decryption of Tokens

To gain access to the necessary tokens, the attackers extract the token-GAIA ID pair from Google. These tokens are then decrypted using an encryption key stored in Chrome’s Local State within the UserData directory. By successfully decrypting the tokens, threat actors acquire the means to recreate Google cookies.

Usage of Token-GAIA ID Pair with MultiLogin Endpoint

The malicious actors utilize the extracted token-GAIA ID pair alongside the MultiLogin endpoint to regenerate Google cookies. This intricate process guarantees persistent access, enabling them to compromise user accounts indefinitely.

Announcement of Discovery and Lumma’s Implementation

The discovery of this exploit was initially announced by a malware developer in October. By mid-November, the prominent infostealer family, Lumma, had already implemented this technique, solidifying its presence in the cybercrime landscape. To ensure exclusivity, Lumma encrypted the token-GAIA ID pair with its own keys, making it challenging for other malware families to utilize the same mechanism.

Adoption of the Technique by Other Infostealers

The success of the technique did not go unnoticed, as by the end of December, six other infostealer families were observed actively leveraging this new exploit. This widespread adoption further cemented the severity of the vulnerability and the threat it posed to user accounts and data.

Continued Effectiveness of the Exploit

One of the most alarming aspects of this exploit is its persistence even after users reset their passwords. This means that threat actors can continue to exploit compromised accounts, potentially going unnoticed by victims. Such long-lasting access could result in significant data breaches and compromise user privacy.

Actions Taken by Google to Secure Compromised Accounts

Recognizing the severity of the situation, Google has taken swift action to secure any compromised accounts detected. Users can invalidate stolen sessions simply by signing out of the affected browser. Additionally, Google provides the option to remotely revoke stolen sessions via the user’s devices page, ensuring that the exploit loses its potency.

With the adoption of a new technique that allows information stealers to continuously access compromised Google accounts, the need for heightened security measures is evident. Google’s prompt response and the ability for users to take action against compromised sessions are crucial steps in mitigating this threat. As cybercriminals continually seek new avenues for exploitation, remaining vigilant and adopting robust security practices are essential to protecting personal information and maintaining data privacy.

Explore more

Trend Analysis: Australian Payroll Compliance Software

The Australian payroll landscape has fundamentally transitioned from a mundane back-office administrative task into a high-stakes strategic priority where manual calculation errors are no longer considered an acceptable business risk. This shift is driven by a convergence of increasingly stringent “Modern Awards,” complex Single Touch Payroll (STP) Phase 2 mandates, and aggressive regulatory oversight that collectively forces a massive migration

Trend Analysis: Automated Global Payroll Systems

The era of the back-office payroll department buried under mountains of spreadsheets and manual tax tables has officially reached its expiration date. In today’s hyper-connected global economy, businesses are no longer confined by physical borders, yet many remain tethered by the sheer complexity of international labor laws and localized compliance requirements. Automated global payroll systems have emerged as the critical

Trend Analysis: Proactive Safety in Autonomous Robotics

The era of the heavy industrial robot sequestered behind a high-voltage cage is rapidly fading into the history of manufacturing. Today, the factory floor is a landscape of constant motion where autonomous systems navigate the same corridors as human workers with an agility that was once considered science fiction. This transition represents more than a simple upgrade in hardware; it

The 2026 Shift Toward AI-Driven Autonomous Industrial Operations

The convergence of sophisticated artificial intelligence and physical manufacturing has reached a critical tipping point where human intervention is no longer the primary driver of operational success. Modern facilities have moved beyond simple automation, transitioning into integrated ecosystems that function with a degree of independence previously reserved for science fiction. This evolution represents a fundamental shift in how industrial entities

Trend Analysis: Enterprise AI Automation Trends

The integration of sophisticated algorithmic intelligence into the very fabric of corporate infrastructure has moved far beyond the initial hype cycle, solidifying itself as the primary engine for modern competitive advantage in the global economy. Organizations no longer view these technologies as experimental add-ons but rather as foundational requirements that dictate the speed and scale of their operations. This shift