Security researchers found a hack that lets cybercriminals access people’s Google accounts without needing their passwords.
CloudSEK, a security firm, has discovered a highly perilous type of malware that illicitly obtains individuals’ sensitive data by exploiting third-party cookies. Disturbingly, this malicious software has already caught the attention of hacking groups, who are actively conducting tests with it.
Cybersecurity researcher Jeremiah Fowler discovered an unsecured database with 170,360 records belonging to a real estate company. It contained personal...
GreyNoise found attempts to exploit CVE-2023-28771, a vulnerability in Zyxel's IKE affecting UDP port 500. The attack centers around CVE-2023-28771,...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently included two high-risk vulnerabilities in its Known Exploited Vulnerabilities (KEV)...
SoftBank has disclosed that personal information of more than 137,000 mobile subscribers—covering names, addresses, and phone numbers—might have been leaked...
The exploit was first revealed in October 2023, when a hacker shared it in a Telegram channel.
The post mentioned that accounts could be accessed through a cookie vulnerability, used by websites and browsers to track users.
Google authentication cookies let users access their accounts without entering their login details every time. However, hackers have found a way to steal these cookies to bypass two-factor authentication.
Google Chrome, the most popular web browser worldwide with over 60% market share last year, is currently taking action against third-party cookies.
“We routinely upgrade our defences against such techniques and to secure users who fall victim to malware. In this instance, Google has taken action to secure any compromised accounts detected,” Google said in a statement.
“Users should continually take steps to remove any malware from their computer, and we recommend turning on Enhanced Safe Browsing in Chrome to protect against phishing and malware downloads.”
This discovery highlights the intricate and covert nature of contemporary cyber attacks.
“This exploit enables continuous access to Google services, even after a user’s password is reset,” Pavan Karthick M, a threat intelligence researcher at CloudSEK, wrote in a blog post detailing the issue.
“It highlights the necessity for continuous monitoring of both technical vulnerabilities and human intelligence sources to stay ahead of emerging cyber threats.”