chief security officer
  • macropolicy
  • Industrial Development
  • CSO·Insight
  • Threat intelligence
  • Data Security
  • privacy protection
  • Cloud security
  • en_USEN
    • de_DEDE
    • ru_RURU
    • zh_CNCN
    • zh_TWTW
    • jaJP
    • ko_KRKR
Sign in Sign up
Creation Center
  1. chief security officerHome
  2. intelligence gathering

Malware Exploits Google Multiple Sign-On Vulnerability to Maintain Access After Password Reset

chief security officer • January 4, 2024 at 7:15 pm • intelligence gathering • 10184 views

The information-stealing malware is actively utilizing an unspecified Google OAuth endpoint called MultiLogin to hijack user sessions and allow users to continue accessing Google services even after resetting their passwords.

According to CloudSEK, this critical vulnerability exploits session persistence and cookie generation, allowing threat actors to maintain access to valid sessions in an unauthorized manner.

On October 20, 2023, a threat actor named PRISMA first disclosed the technique on his Telegram channel. Since then, the technique has been incorporated into variousmalicious softwareAs-a-Service (MaaS) stealer program families such as Lumma, Rhadamanthys, Stealc, Meduza, RisePro, and WhiteSnake.

The MultiLogin authentication endpoint is primarily used to synchronize Google accounts across services when a user logs in to their account (i.e. profile) via Chrome.

Security researcher Pavan Karthick M said, "Reverse engineering of the Lumma Stealer code shows that the technique targets "Chrome's WebData token_service table to extract tokens and account IDs for logged-in Chrome profiles . "The table contains two key columns: the service (GAIA ID) and the cryptographic token.

This token:GAIA ID pair is then combined with the MultiLogin endpoint to regenerate the Google authentication cookie.

Malware Exploits Google Multiple Sign-On Vulnerability to Maintain Access After Password Reset

Test different token-cookie generation scenarios in three ways

When a user logs in using a browser, in this case the token can be used multiple times.
When a user changes their password but still keeps Google logged in, in this case the token can only be used once because the token has already been used once to keep the user logged in.
If the user logs out of the browser, then the token will be canceled and deleted from the browser's local storage and will be regenerated when logging in again.
Google acknowledged the existence of this method of attack in an interview, but noted that users can undo the stolen sessions by logging out of the affected browsers.

Google has taken note of recent reports of malware families stealing session tokens." Attacks involving malware stealing cookies and tokens are not new; we regularly upgrade our defenses against such techniques and to ensure the safety of users who fall victim to malware. In this case, Google has taken action to ensure the safety of all compromised accounts detected.

However, it is important to note that there is a misconception in the report that users cannot revoke stolen tokens and cookies," it further added." This is incorrect, stolen sessions can be deactivated by exiting the affected browser or revoking them remotely through the user's device page. We will continue to monitor the situation and provide updates as necessary.

Users are advised to turn on the Enhanced Safe Browsing feature in Chrome to prevent phishing and malware downloads.

Safety Recommendations:

Change passwords to prevent attackers from using the password reset process to restore access.
Monitor account activity and look out for suspicious logins from unfamiliar IPs and locations.
The incident highlights the potential challenges of traditional account security methods and the need for more advanced security solutions to address information theft threats commonly used by cybercriminals.

A complex vulnerability was revealed through the security incident, which could challenge traditional methods of account security. While Google's measures are valuable, this situation highlights the need for more advanced security solutions to address evolving cyber threats, such as the information-stealing programs that are so popular among cybercriminals today.

Original article by Chief Security Officer, if reproduced, please credit https://www.cncso.com/en/malware-using-google-multilogin-exploit.html

google securitygoogle login vulnerabilityOAuth Vulnerability Risksinformation securitymalicious softwarecyber securityAccount Security
Like (0)
0 0
Generate poster

About the author

chief security officer

chief security officer

126 posts
4 comments
1 questions
3 answers
5 followers
Chief Security Officer (cncso.com)
Google sued for tracking users in incognito mode, agrees to pay $5 billion settlement
Previous January 3, 2024 at 7:14 pm
UAC-0050 Organization updates phishing tactics, deploys remote control Trojan horse Remcos RAT
Next January 4, 2024 8:00 pm

related suggestion

  • WordPress 6.4.2 releases update to address high-risk remote code execution vulnerability Vulnerability information

    WordPress 6.4.2 releases update to address high-risk remote code execution vulnerability

    013.6K00
    chief security officer chief security officer
    December 10, 2023
  • Google sued for tracking users in incognito mode, agrees to pay $5 billion settlement intelligence gathering

    Google sued for tracking users in incognito mode, agrees to pay $5 billion settlement

    010.8K00
    chief security officer chief security officer
    January 3, 2024
  • GitLab Create Workspace Write Arbitrary File Overwrite Vulnerability intelligence gathering

    GitLab Create Workspace Write Arbitrary File Overwrite Vulnerability

    08.8K00
    chief security officer chief security officer
    February 1, 2024
  • Data security: How does generative AI deal with security risks and challenges? CSO·Insight

    Data security: How does generative AI deal with security risks and challenges?

    014.0K00
    chief security officer chief security officer
    December 8, 2023
  • Safe operations from the perspective of Party A and Party B Safe operation

    Safe operations from the perspective of Party A and Party B

    010.8K01
    chief security officer chief security officer
    March 1, 2024
  • Apache Ofbiz xml-RPC remote code execution vulnerability (CVE-2023-49070) Vulnerability information

    Apache Ofbiz xml-RPC remote code execution vulnerability (CVE-2023-49070)

    015.2K00
    lyon lyon
    December 7, 2023
chief security officer
chief security officer
chief security officer

Chief Security Officer (cncso.com)

126 posts
4 comments
1 questions
3 answers
5 followers

Recent Posts

  • CSO:2025年中国网络安全从合规到AI驱动风险治理趋势
  • Data Security Intelligence Body: AI-driven paradigm for next-generation enterprise data security protection
  • AI Security:Artificial Intelligence AI Attack Surface Analysis Report 2026
  • Global Cyber Attack Landscape and AI Security Threat Report 2025
  • AI Security: Building an Enterprise AI Security System Based on ATT&CK Methodology
  • AI IDE Security: Cursor Windsurf Google Antigravity Supply Chain Attack Analysis
  • CSO:2025 Artificial Intelligence (AI) Cyber Attack and Defense Statistics, Trends, Costs, and Defense Security Report
  • CSO: A Chief Security Officer's Guide to Full-Link Security for Artificial Intelligence Data
  • The MCP Governance Framework: How to build a next-generation security model that resists AI superpowers
  • AI security architecture: from AI capabilities to security platform landing practice

Recommended reading

  • CSO:2025年中国网络安全从合规到AI驱动风险治理趋势

    CSO:2025年中国网络安全从合规到AI驱动风险治理趋势

    2026年1月18日

  • Data Security Intelligence Body: AI-driven paradigm for next-generation enterprise data security protection

    Data Security Intelligence Body: AI-driven paradigm for next-generation enterprise data security protection

    January 13, 2026

  • AI Security:Artificial Intelligence AI Attack Surface Analysis Report 2026

    AI Security:Artificial Intelligence AI Attack Surface Analysis Report 2026

    January 10, 2026

  • Global Cyber Attack Landscape and AI Security Threat Report 2025

    Global Cyber Attack Landscape and AI Security Threat Report 2025

    January 9, 2026

  • AI Security: Building an Enterprise AI Security System Based on ATT&CK Methodology

    AI Security: Building an Enterprise AI Security System Based on ATT&CK Methodology

    January 9, 2026

  • AI IDE Security: Cursor Windsurf Google Antigravity Supply Chain Attack Analysis

    AI IDE Security: Cursor Windsurf Google Antigravity Supply Chain Attack Analysis

    January 7, 2026

  • Large model security: open source framework Guardrails security fence introduction and analysis

    Large model security: open source framework Guardrails security fence introduction and analysis

    January 6, 2026

  • CSO:2025 Artificial Intelligence (AI) Cyber Attack and Defense Statistics, Trends, Costs, and Defense Security Report

    CSO:2025 Artificial Intelligence (AI) Cyber Attack and Defense Statistics, Trends, Costs, and Defense Security Report

    January 4, 2026

  • CSO: A Chief Security Officer's Guide to Full-Link Security for Artificial Intelligence Data

    CSO: A Chief Security Officer's Guide to Full-Link Security for Artificial Intelligence Data

    December 31, 2025

  • The MCP Governance Framework: How to build a next-generation security model that resists AI superpowers

    The MCP Governance Framework: How to build a next-generation security model that resists AI superpowers

    December 30, 2025

chief security officer
  • fig. beginning
  • My Account
  • Creation Center
  • Privacy Policy
  • safe community
  • about Us
  • Sitemap

Copyright © 2020 Chief Security Officer. All Rights Reserved.
浙ICP备2023041448号 | Zhejiang Public Network Security No. 33011002017423