Security researchers found a hack that lets cybercriminals access people’s Google accounts without needing their passwords.
CloudSEK, a security firm, has discovered a highly perilous type of malware that illicitly obtains individuals’ sensitive data by exploiting third-party cookies. Disturbingly, this malicious software has already caught the attention of hacking groups, who are actively conducting tests with it.
A newly discovered vulnerability called "G-Door" enables malicious actors to bypass Microsoft 365 security by exploiting unmanaged Google Docs accounts....
Mastercard has completed its acquisition of Recorded Future, an AI-based threat intelligence provider. Mastercard has acquired the company for $2.65...
CISA has released eight advisories on vulnerabilities in Industrial Control Systems (ICS). These vulnerabilities affect essential software and hardware in...
Sophos has fixed three separate security vulnerabilities in Sophos Firewall. The vulnerabilities CVE-2024-12727, CVE-2024-12728, and CVE-2024-12729 present major risks, such...
The exploit was first revealed in October 2023, when a hacker shared it in a Telegram channel.
The post mentioned that accounts could be accessed through a cookie vulnerability, used by websites and browsers to track users.
Google authentication cookies let users access their accounts without entering their login details every time. However, hackers have found a way to steal these cookies to bypass two-factor authentication.
Google Chrome, the most popular web browser worldwide with over 60% market share last year, is currently taking action against third-party cookies.
“We routinely upgrade our defences against such techniques and to secure users who fall victim to malware. In this instance, Google has taken action to secure any compromised accounts detected,” Google said in a statement.
“Users should continually take steps to remove any malware from their computer, and we recommend turning on Enhanced Safe Browsing in Chrome to protect against phishing and malware downloads.”
This discovery highlights the intricate and covert nature of contemporary cyber attacks.
“This exploit enables continuous access to Google services, even after a user’s password is reset,” Pavan Karthick M, a threat intelligence researcher at CloudSEK, wrote in a blog post detailing the issue.
“It highlights the necessity for continuous monitoring of both technical vulnerabilities and human intelligence sources to stay ahead of emerging cyber threats.”