chief security officer
  • fig. beginning
  • macropolicy
  • Industrial Development
  • CSO·Insight
  • Threat intelligence
  • Data Security
  • privacy protection
  • Cloud security
  • EN
    • CN
    • DE
    • RU
    • TW
    • JP
    • KR
Sign in Sign up
Creation Center
  1. chief security officerHome
  2. intelligence gathering

Malware Exploits Google Multiple Sign-On Vulnerability to Maintain Access After Password Reset

chief security officer • January 4, 2024 at 7:15 pm • intelligence gathering • 11133 views

The information-stealing malware is actively utilizing an unspecified Google OAuth endpoint called MultiLogin to hijack user sessions and allow users to continue accessing Google services even after resetting their passwords.

According to CloudSEK, this critical vulnerability exploits session persistence and cookie generation, allowing threat actors to maintain access to valid sessions in an unauthorized manner.

On October 20, 2023, a threat actor named PRISMA first disclosed the technique on his Telegram channel. Since then, the technique has been incorporated into variousmalicious softwareAs-a-Service (MaaS) stealer program families such as Lumma, Rhadamanthys, Stealc, Meduza, RisePro, and WhiteSnake.

The MultiLogin authentication endpoint is primarily used to synchronize Google accounts across services when a user logs in to their account (i.e. profile) via Chrome.

Security researcher Pavan Karthick M said, "Reverse engineering of the Lumma Stealer code shows that the technique targets "Chrome's WebData token_service table to extract tokens and account IDs for logged-in Chrome profiles . "The table contains two key columns: the service (GAIA ID) and the cryptographic token.

This token:GAIA ID pair is then combined with the MultiLogin endpoint to regenerate the Google authentication cookie.

Malware Exploits Google Multiple Sign-On Vulnerability to Maintain Access After Password Reset

Test different token-cookie generation scenarios in three ways

When a user logs in using a browser, in this case the token can be used multiple times.
When a user changes their password but still keeps Google logged in, in this case the token can only be used once because the token has already been used once to keep the user logged in.
If the user logs out of the browser, then the token will be canceled and deleted from the browser's local storage and will be regenerated when logging in again.
Google acknowledged the existence of this method of attack in an interview, but noted that users can undo the stolen sessions by logging out of the affected browsers.

Google has taken note of recent reports of malware families stealing session tokens." Attacks involving malware stealing cookies and tokens are not new; we regularly upgrade our defenses against such techniques and to ensure the safety of users who fall victim to malware. In this case, Google has taken action to ensure the safety of all compromised accounts detected.

However, it is important to note that there is a misconception in the report that users cannot revoke stolen tokens and cookies," it further added." This is incorrect, stolen sessions can be deactivated by exiting the affected browser or revoking them remotely through the user's device page. We will continue to monitor the situation and provide updates as necessary.

Users are advised to turn on the Enhanced Safe Browsing feature in Chrome to prevent phishing and malware downloads.

Safety Recommendations:

Change passwords to prevent attackers from using the password reset process to restore access.
Monitor account activity and look out for suspicious logins from unfamiliar IPs and locations.
The incident highlights the potential challenges of traditional account security methods and the need for more advanced security solutions to address information theft threats commonly used by cybercriminals.

A complex vulnerability was revealed through the security incident, which could challenge traditional methods of account security. While Google's measures are valuable, this situation highlights the need for more advanced security solutions to address evolving cyber threats, such as the information-stealing programs that are so popular among cybercriminals today.

Original article by Chief Security Officer, if reproduced, please credit https://www.cncso.com/en/malware-using-google-multilogin-exploit.html

google securitygoogle login vulnerabilityOAuth Vulnerability Risksinformation securitymalicious softwarecyber securityAccount Security
Like (0)
0 0
Generate poster

About the author

chief security officer

chief security officer

137 posts
4 comments
1 questions
3 answers
6 followers
Chief Security Officer (cncso.com)
Google sued for tracking users in incognito mode, agrees to pay $5 billion settlement
Previous January 3, 2024 at 7:14 pm
UAC-0050 Organization updates phishing tactics, deploys remote control Trojan horse Remcos RAT
Next January 4, 2024 8:00 pm

related suggestion

  • The rise of ransomware as a service (RaaS) users face more severe threats intelligence gathering

    The rise of ransomware as a service (RaaS) users face more severe threats

    014.2K00
    chief security officer chief security officer
    December 10, 2023
  • WordPress 6.4.2 releases update to address high-risk remote code execution vulnerability Vulnerability information

    WordPress 6.4.2 releases update to address high-risk remote code execution vulnerability

    015.2K00
    chief security officer chief security officer
    December 10, 2023
  • Data security: How does generative AI deal with security risks and challenges? CSO·Insight

    Data security: How does generative AI deal with security risks and challenges?

    015.6K00
    chief security officer chief security officer
    December 8, 2023
  • Malicious AI tool FraudGPT is sold on the dark web, causing network security issues intelligence gathering

    Malicious AI tool FraudGPT is sold on the dark web, causing network security issues

    014.0K00
    lyon lyon
    August 1, 2023
  • Google open-sources Magika AI document recognition Safe operation

    Google open-sources Magika AI document recognition

    011.9K00
    chief security officer chief security officer
    February 17, 2024
  • North Korean hacker group Lazarus Group launches new cyber attack operation intelligence gathering

    North Korean hacker group Lazarus Group launches new cyber attack operation

    012.8K00
    chief security officer chief security officer
    December 11, 2023
chief security officer
chief security officer
chief security officer

Chief Security Officer (cncso.com)

137 posts
4 comments
1 questions
3 answers
6 followers

Popular Recommendations

  • Google Zero Trust Architecture Practice
    275.1K

    Google Zero Trust Architecture Practice

  • WPS Office for windows is dealing with a certain OLE mechanism remote code vulnerability

    WPS Office for windows is dealing with a certain OLE mechanism remote code vulnerability

    61.9K
  • StripChat adult video website vulnerability leaks sensitive data of tens of millions of users

    StripChat adult video website vulnerability leaks sensitive data of tens of millions of users

    52.5K
  • Alibaba Cloud Zero Trust Practice: Identity and Network Micro-Isolation in Production Networks

    Alibaba Cloud Zero Trust Practice: Identity and Network Micro-Isolation in Production Networks

    34.6K
  • Practice and exploration of consumer personal information protection in takeaway business scenarios

    Practice and exploration of consumer personal information protection in takeaway business scenarios

    27.1K
  • AIGC Artificial Intelligence Safety Report 2024

    AIGC Artificial Intelligence Safety Report 2024

    26.5K
  • Security Parallel: Next Generation Native Security Infrastructure

    Security Parallel: Next Generation Native Security Infrastructure

    24.8K
  • New secure infrastructure: Alibaba data asset blueprint

    New secure infrastructure: Alibaba data asset blueprint

    24.6K
  • [Critical] Remote code execution vulnerability in open source Apache Log4j

    [Critical] Remote code execution vulnerability in open source Apache Log4j

    22.2K
  • China's new development in the digital era, network security has entered a new era

    China's new development in the digital era, network security has entered a new era

    21.8K
chief security officer
  • fig. beginning
  • Creation Center
  • Privacy Policy
  • Personal center
  • about Us
  • Sitemap
  • CN
  • EN
  • DE

Copyright © 2020 Chief Security Officer. All Rights Reserved.
浙ICP备2023041448号 | Zhejiang Public Network Security No. 33011002017423