Multiple Information Stealers Exploit Zero-Day in Google’s Authentication Process to Persistently Compromise Accounts

In recent months, a concerning trend has emerged within the cybercriminal community – multiple information stealers have creatively exploited a vulnerability in Google’s authentication process. This exploit allows threat actors to exploit Google cookies and gain continuous access to user accounts, even if the victims change their passwords. This article delves into the details of this technique, its implications, and the actions taken by Google to mitigate the threat.

Technique for Restoring Google Cookies and Compromising Accounts Even After Password Change

Cyber attackers have discovered a method to regain control over compromised Google accounts, even if the victims change their passwords. This technique enables the persistent compromise of user accounts, posing significant risks to personal information and sensitive data.

Vulnerability in Google’s Authentication Process

The exploit revolves around an undisclosed vulnerability that some experts have labeled as a zero-day vulnerability. This vulnerability is related to the undocumented MultiLogin endpoint used for synchronizing accounts across Google services. When combined with account ID and tokens extracted from Chrome, it becomes a potent method for compromising accounts.

The term “zero-day” refers to a security vulnerability that is unknown to the software vendor, making it challenging to detect and patch promptly. In this case, the zero-day vulnerability allows threat actors to regenerate persistent Google cookies and gain continuous access to Google services.

The MultiLogin endpoint, when utilized in combination with the extracted tokens and account ID, acts as a catalyst for the regeneration of Google cookies. By leveraging this endpoint, threat actors can regain control over accounts and perpetuate their malicious activities.

Extraction and Decryption of Tokens

To gain access to the necessary tokens, the attackers extract the token-GAIA ID pair from Google. These tokens are then decrypted using an encryption key stored in Chrome’s Local State within the UserData directory. By successfully decrypting the tokens, threat actors acquire the means to recreate Google cookies.

Usage of Token-GAIA ID Pair with MultiLogin Endpoint

The malicious actors utilize the extracted token-GAIA ID pair alongside the MultiLogin endpoint to regenerate Google cookies. This intricate process guarantees persistent access, enabling them to compromise user accounts indefinitely.

Announcement of Discovery and Lumma’s Implementation

The discovery of this exploit was initially announced by a malware developer in October. By mid-November, the prominent infostealer family, Lumma, had already implemented this technique, solidifying its presence in the cybercrime landscape. To ensure exclusivity, Lumma encrypted the token-GAIA ID pair with its own keys, making it challenging for other malware families to utilize the same mechanism.

Adoption of the Technique by Other Infostealers

The success of the technique did not go unnoticed, as by the end of December, six other infostealer families were observed actively leveraging this new exploit. This widespread adoption further cemented the severity of the vulnerability and the threat it posed to user accounts and data.

Continued Effectiveness of the Exploit

One of the most alarming aspects of this exploit is its persistence even after users reset their passwords. This means that threat actors can continue to exploit compromised accounts, potentially going unnoticed by victims. Such long-lasting access could result in significant data breaches and compromise user privacy.

Actions Taken by Google to Secure Compromised Accounts

Recognizing the severity of the situation, Google has taken swift action to secure any compromised accounts detected. Users can invalidate stolen sessions simply by signing out of the affected browser. Additionally, Google provides the option to remotely revoke stolen sessions via the user’s devices page, ensuring that the exploit loses its potency.

With the adoption of a new technique that allows information stealers to continuously access compromised Google accounts, the need for heightened security measures is evident. Google’s prompt response and the ability for users to take action against compromised sessions are crucial steps in mitigating this threat. As cybercriminals continually seek new avenues for exploitation, remaining vigilant and adopting robust security practices are essential to protecting personal information and maintaining data privacy.

Explore more

Cognitive Workforce Twins: Revolutionizing HRtech with AI

Setting the Stage for HRtech Transformation In today’s fast-paced business environment, HR technology stands at a critical juncture, grappling with the challenge of managing a workforce that is increasingly hybrid, diverse, and skill-dependent. A staggering statistic reveals that over 60% of organizations struggle with skill gaps that hinder their ability to adapt to technological advancements, underscoring a pressing need for

Insurers’ Path to Profitability in 2025 Through Innovation

The insurance industry today stands at a critical juncture, grappling with a staggering rise in claims costs driven by inflation, which industry reports estimate to have surged by over 15% in the last year alone, creating significant economic strain. Coupled with fierce competition and rapidly evolving customer expectations, this paints a challenging picture for insurers striving to maintain profitability. Amid

How Can Employers Master Employee Leave Management?

The significance of managing employee leave effectively cannot be overstated, especially when considering that a poorly handled leave process can lead to legal disputes, decreased morale, and operational disruptions. Imagine a scenario where a valued employee requests time off for a medical condition, only to face delays, miscommunication, or perceived unfairness due to unclear policies. Such situations not only risk

Trend Analysis: Multi-Cloud Security Integration

In an era where digital infrastructure spans multiple cloud platforms, the complexity of managing security across diverse environments has become a pressing challenge for enterprises worldwide. As businesses increasingly rely on providers like AWS, Google Cloud, and Microsoft Azure to power their operations, the risk of misconfigurations, compliance gaps, and costly security breaches escalates, underscoring the urgent need for integrated

HR Tech Revolution: Automation and Data Unity for 2026

Setting the Stage for HR Transformation As the business landscape accelerates into a tech-driven future, human resources (HR) departments face mounting pressure to evolve with the times and adapt to new challenges. A staggering 43% of HR decision-makers are prioritizing technology upgrades for 2026, driven by the need to eliminate inefficiencies that plague current operations and hinder productivity. This surge