AI & SecurityHIGH

Google Chrome - New Protection Against Session Cookie Theft

Featured image for Google Chrome - New Protection Against Session Cookie Theft
#Google Chrome#Device Bound Session Credentials#session cookies#infostealer#malware

Original Reporting

BCBleepingComputer·Ionut Ilascu

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🤖
🤖 AI RISK ASSESSMENT
AI Model/System
Vendor/Developer
Risk Type
Attack Surface
Affected Use Case
Exploit Complexity
Mitigation Available
Regulatory Relevance
🎯

Basically, Google Chrome now protects your online sessions from hackers stealing your login cookies.

Quick Summary

Google Chrome has rolled out a new feature to protect against session cookie theft by infostealer malware. This enhancement significantly boosts user security. Web developers are encouraged to implement this protocol for better protection.

What Happened

Google has launched a new security feature in Chrome 146 for Windows called Device Bound Session Credentials (DBSC). This innovative protection aims to prevent info-stealing malware from harvesting session cookies, which are essential for maintaining user authentication online.

How It Works

The DBSC feature works by cryptographically linking a user's session to their specific hardware. This is achieved through the computer's security chip, such as the Trusted Platform Module (TPM) on Windows devices. By generating unique public/private keys for encrypting sensitive data, the system ensures that these keys cannot be exported from the machine. Consequently, even if an attacker manages to steal session cookies, they cannot access the corresponding private key, rendering the stolen data useless.

Who's Being Targeted

Threat actors often utilize specialized malware known as infostealers to collect session cookies. With families like LummaC2 becoming increasingly sophisticated, the risk of unauthorized access to user accounts has risen significantly. Once malware infiltrates a device, it can read local files and memory where browsers store authentication cookies, making it crucial to have robust protection in place.

Why This Matters

The introduction of DBSC represents a significant advancement in browser security. Google has noted a decline in session theft events during a year of testing with various web platforms, including Okta. By implementing this protocol, websites can enhance their security without sacrificing compatibility with existing systems. This proactive approach is vital as it addresses a common vulnerability exploited by cybercriminals.

What You Should Do

Web developers are encouraged to upgrade their systems to support the DBSC protocol. This involves adding dedicated registration and refresh endpoints to their backends. Google has provided a guide for implementation, and specifications are available on the World Wide Web Consortium (W3C) website. Ensuring that your browser and websites are up-to-date will help safeguard against session cookie theft.

By adopting these new security measures, users can enjoy a more secure online experience, reducing the risk of falling victim to infostealer attacks.

🏢 Impacted Sectors

Technology

Pro Insight

🔒 Pro insight: The DBSC implementation marks a pivotal shift in browser security, potentially setting a new standard for session management across platforms.

Sources

Original Report

BCBleepingComputer· Ionut Ilascu
Read Original

Related Pings

HIGHAI & Security

Project Glasswing - A Turning Point for Cybersecurity

Anthropic's Project Glasswing introduces a powerful AI model that can autonomously discover zero-day vulnerabilities. This innovation poses new challenges for cybersecurity defenders, as attackers could exploit vulnerabilities faster than ever. The landscape of cybersecurity is changing, and organizations must adapt to these advancements.

Arctic Wolf Blog·
HIGHAI & Security

Apple Intelligence - Researchers Expose Prompt Injection Flaw

A newly discovered prompt injection vulnerability in Apple Intelligence could allow malicious actors to manipulate AI outputs, affecting millions of users. Immediate software updates are recommended.

The Register Security·
MEDIUMAI & Security

Asqav - New Open-Source SDK for AI Agent Governance

Asqav is a new open-source SDK that enhances AI agent governance with quantum-safe signatures. This tool ensures accountability in AI operations, making it easier for developers to track actions securely.

Help Net Security·
HIGHAI & Security

Cloudflare and GoDaddy Unite Against Rogue AI Bots

Cloudflare and GoDaddy are joining forces to tackle rogue AI bots. This partnership aims to protect content creators from automated scrapers. Their new initiative introduces standards for better AI engagement online.

SC Media·
HIGHAI & Security

Trellix Enhances Data Security for Generative AI Era

Trellix has launched enhanced data security features for generative AI. This aims to protect sensitive data amid rising risks. Organizations can now adopt AI confidently while safeguarding their information.

Help Net Security·
HIGHAI & Security

Claude Mythos - Unveils Zero-Day Detection Capabilities

Anthropic's Claude Mythos Preview has been unveiled, showcasing its ability to autonomously discover zero-day vulnerabilities. This powerful tool raises significant security concerns, necessitating collaboration to patch critical software systems. The implications for cybersecurity are profound, as it could change how vulnerabilities are identified and addressed.

Cyber Security News·