chief security officer
  • macropolicy
  • Industrial Development
  • CSO·Insight
  • Threat intelligence
  • Data Security
  • privacy protection
  • Cloud security
  • en_USEN
    • de_DEDE
    • ru_RURU
    • zh_CNCN
    • zh_TWTW
    • jaJP
    • ko_KRKR
Sign in Sign up
Creation Center
  1. chief security officerHome
  2. intelligence gathering

Malware Exploits Google Multiple Sign-On Vulnerability to Maintain Access After Password Reset

chief security officer • January 4, 2024 at 7:15 pm • intelligence gathering • 10150 views

The information-stealing malware is actively utilizing an unspecified Google OAuth endpoint called MultiLogin to hijack user sessions and allow users to continue accessing Google services even after resetting their passwords.

According to CloudSEK, this critical vulnerability exploits session persistence and cookie generation, allowing threat actors to maintain access to valid sessions in an unauthorized manner.

On October 20, 2023, a threat actor named PRISMA first disclosed the technique on his Telegram channel. Since then, the technique has been incorporated into variousmalicious softwareAs-a-Service (MaaS) stealer program families such as Lumma, Rhadamanthys, Stealc, Meduza, RisePro, and WhiteSnake.

The MultiLogin authentication endpoint is primarily used to synchronize Google accounts across services when a user logs in to their account (i.e. profile) via Chrome.

Security researcher Pavan Karthick M said, "Reverse engineering of the Lumma Stealer code shows that the technique targets "Chrome's WebData token_service table to extract tokens and account IDs for logged-in Chrome profiles . "The table contains two key columns: the service (GAIA ID) and the cryptographic token.

This token:GAIA ID pair is then combined with the MultiLogin endpoint to regenerate the Google authentication cookie.

Malware Exploits Google Multiple Sign-On Vulnerability to Maintain Access After Password Reset

Test different token-cookie generation scenarios in three ways

When a user logs in using a browser, in this case the token can be used multiple times.
When a user changes their password but still keeps Google logged in, in this case the token can only be used once because the token has already been used once to keep the user logged in.
If the user logs out of the browser, then the token will be canceled and deleted from the browser's local storage and will be regenerated when logging in again.
Google acknowledged the existence of this method of attack in an interview, but noted that users can undo the stolen sessions by logging out of the affected browsers.

Google has taken note of recent reports of malware families stealing session tokens." Attacks involving malware stealing cookies and tokens are not new; we regularly upgrade our defenses against such techniques and to ensure the safety of users who fall victim to malware. In this case, Google has taken action to ensure the safety of all compromised accounts detected.

However, it is important to note that there is a misconception in the report that users cannot revoke stolen tokens and cookies," it further added." This is incorrect, stolen sessions can be deactivated by exiting the affected browser or revoking them remotely through the user's device page. We will continue to monitor the situation and provide updates as necessary.

Users are advised to turn on the Enhanced Safe Browsing feature in Chrome to prevent phishing and malware downloads.

Safety Recommendations:

Change passwords to prevent attackers from using the password reset process to restore access.
Monitor account activity and look out for suspicious logins from unfamiliar IPs and locations.
The incident highlights the potential challenges of traditional account security methods and the need for more advanced security solutions to address information theft threats commonly used by cybercriminals.

A complex vulnerability was revealed through the security incident, which could challenge traditional methods of account security. While Google's measures are valuable, this situation highlights the need for more advanced security solutions to address evolving cyber threats, such as the information-stealing programs that are so popular among cybercriminals today.

Original article by Chief Security Officer, if reproduced, please credit https://www.cncso.com/en/malware-using-google-multilogin-exploit.html

google securitygoogle login vulnerabilityOAuth Vulnerability Risksinformation securitymalicious softwarecyber securityAccount Security
Like (0)
0 0
Generate poster

About the author

chief security officer

chief security officer

125 posts
4 comments
1 questions
3 answers
5 followers
Chief Security Officer (cncso.com)
Google sued for tracking users in incognito mode, agrees to pay $5 billion settlement
Previous January 3, 2024 at 7:14 pm
UAC-0050 Organization updates phishing tactics, deploys remote control Trojan horse Remcos RAT
Next January 4, 2024 8:00 pm

related suggestion

  • The Russian Matrix: Revealing the Operations of Wazawaka and its Cyber Extortion Gang intelligence gathering

    The Russian Matrix: Revealing the Operations of Wazawaka and its Cyber Extortion Gang

    011.3K00
    chief security officer chief security officer
    December 19, 2023
  • Iran's cyber espionage "muddy waters" are back, and the Middle East telecommunications industry has become a new hunting ground intelligence gathering

    Iran's cyber espionage "muddy waters" are back, and the Middle East telecommunications industry has become a new hunting ground

    010.3K00
    chief security officer chief security officer
    December 19, 2023
  • Global DevSecOps Status Report 2023 CSO·Insight

    Global DevSecOps Status Report 2023

    013.8K00
    SnowFlake SnowFlake
    January 8, 2024
  • Google chrome V8 JavaScript Engine Type Obfuscation Remote Code Execution Vulnerability CSO·Insight

    Google chrome V8 JavaScript Engine Type Obfuscation Remote Code Execution Vulnerability

    011.5K01
    chief security officer chief security officer
    July 2, 2025
  • China Cyber Security Industry Analysis Report (2023) CSO·Insight

    China Cyber Security Industry Analysis Report (2023)

    012.3K00
    chief security officer chief security officer
    September 20, 2023
  • X (formerly twitter) security team confirms theft of SEC account intelligence gathering

    X (formerly twitter) security team confirms theft of SEC account

    09.8K00
    chief security officer chief security officer
    January 11, 2024
chief security officer
chief security officer
chief security officer

Chief Security Officer (cncso.com)

125 posts
4 comments
1 questions
3 answers
5 followers

Recent Posts

  • Data Security Intelligence Body: AI-driven paradigm for next-generation enterprise data security protection
  • AI Security:Artificial Intelligence AI Attack Surface Analysis Report 2026
  • Global Cyber Attack Landscape and AI Security Threat Report 2025
  • AI Security: Building an Enterprise AI Security System Based on ATT&CK Methodology
  • AI IDE Security: Cursor Windsurf Google Antigravity Supply Chain Attack Analysis
  • CSO:2025 Artificial Intelligence (AI) Cyber Attack and Defense Statistics, Trends, Costs, and Defense Security Report
  • CSO: A Chief Security Officer's Guide to Full-Link Security for Artificial Intelligence Data
  • The MCP Governance Framework: How to build a next-generation security model that resists AI superpowers
  • AI security architecture: from AI capabilities to security platform landing practice
  • AI Intelligence Body Security: GitHub Actions Prompt Word Injection (PromptPwnd) Vulnerability

Recommended reading

  • Data Security Intelligence Body: AI-driven paradigm for next-generation enterprise data security protection

    Data Security Intelligence Body: AI-driven paradigm for next-generation enterprise data security protection

    January 13, 2026

  • AI Security:Artificial Intelligence AI Attack Surface Analysis Report 2026

    AI Security:Artificial Intelligence AI Attack Surface Analysis Report 2026

    January 10, 2026

  • Global Cyber Attack Landscape and AI Security Threat Report 2025

    Global Cyber Attack Landscape and AI Security Threat Report 2025

    January 9, 2026

  • AI Security: Building an Enterprise AI Security System Based on ATT&CK Methodology

    AI Security: Building an Enterprise AI Security System Based on ATT&CK Methodology

    January 9, 2026

  • AI IDE Security: Cursor Windsurf Google Antigravity Supply Chain Attack Analysis

    AI IDE Security: Cursor Windsurf Google Antigravity Supply Chain Attack Analysis

    January 7, 2026

  • Large model security: open source framework Guardrails security fence introduction and analysis

    Large model security: open source framework Guardrails security fence introduction and analysis

    January 6, 2026

  • CSO:2025 Artificial Intelligence (AI) Cyber Attack and Defense Statistics, Trends, Costs, and Defense Security Report

    CSO:2025 Artificial Intelligence (AI) Cyber Attack and Defense Statistics, Trends, Costs, and Defense Security Report

    January 4, 2026

  • CSO: A Chief Security Officer's Guide to Full-Link Security for Artificial Intelligence Data

    CSO: A Chief Security Officer's Guide to Full-Link Security for Artificial Intelligence Data

    December 31, 2025

  • The MCP Governance Framework: How to build a next-generation security model that resists AI superpowers

    The MCP Governance Framework: How to build a next-generation security model that resists AI superpowers

    December 30, 2025

  • AI security architecture: from AI capabilities to security platform landing practice

    AI security architecture: from AI capabilities to security platform landing practice

    December 30, 2025

chief security officer
  • fig. beginning
  • My Account
  • Creation Center
  • Privacy Policy
  • safe community
  • about Us
  • Sitemap

Copyright © 2020 Chief Security Officer. All Rights Reserved.
浙ICP备2023041448号 | Zhejiang Public Network Security No. 33011002017423