PrivacyHIGH

Google's DBSC in Chrome 146 Blocks Session Theft on Windows

Featured image for Google's DBSC in Chrome 146 Blocks Session Theft on Windows
#Google#Chrome#DBSC#session theft#malware

Original Reporting

THThe Hacker News

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelHIGH

High severity β€” significant development or major threat actor activity

πŸ”’
πŸ”’ PRIVACY IMPACT
Policy/Law NameDevice Bound Session Credentials
JurisdictionGlobal
Affected OrganizationGoogle
Data Type InvolvedSession Cookies
Users AffectedWindows Chrome Users
Enforcement BodyGoogle Security Teams
Fine/Penaltyβ€”
Violation TypeSession Theft Mitigation
Consumer Rights ImpactEnhanced Privacy and Security
🎯

Basically, Google made a new tool for Chrome to stop hackers from stealing your online sessions.

Quick Summary

Google has launched Device Bound Session Credentials in Chrome 146 for Windows, enhancing security against session theft. This feature ties sessions to specific devices, making stolen cookies useless. Users can now browse more safely as Google continues to improve its security measures.

What Happened

Google has rolled out Device Bound Session Credentials (DBSC) to all Windows users of its Chrome web browser in version 146. This feature aims to combat the prevalent issue of session theft, a technique where attackers exfiltrate session cookies to gain unauthorized access to online accounts.

How DBSC Works

Session theft typically occurs when malware, such as Atomic or Vidar Stealer, infiltrates a user's system and collects session cookies. These cookies allow attackers to impersonate users without needing their passwords. DBSC addresses this by cryptographically linking the authentication session to a specific device, making stolen cookies practically useless.

Who's Affected

Currently, the DBSC feature is available exclusively to Windows users on Chrome 146, with plans to expand to macOS in future releases. Users who frequently log into sensitive accounts are particularly at risk from session theft and will benefit greatly from this enhancement.

What Data Is Affected

The primary data at risk includes session cookies that allow access to various online accounts. If these cookies are stolen, attackers can exploit them for unauthorized access.

Why It Matters

The introduction of DBSC is significant in the ongoing fight against session theft. By using hardware-backed security modules like the Trusted Platform Module (TPM), DBSC generates a unique public/private key pair that cannot be exported from the device. This means even if a cookie is stolen, it will expire quickly, rendering it useless to attackers.

Future Developments

Google has noted a significant reduction in session theft incidents since the initial launch of DBSC. The company plans to enhance this feature further and make it available on more devices, aiming for broader adoption in enterprise environments. Additionally, the architecture of DBSC is designed to protect user privacy by preventing cross-site tracking and device fingerprinting.

How to Protect Yourself

  • Ensure you are using the latest version of Chrome to benefit from DBSC.
  • Be cautious about downloading software from untrusted sources to minimize malware risks.
  • Regularly update your security software to detect and remove potential threats.

🏒 Impacted Sectors

Technology

Pro Insight

πŸ”’ Pro insight: DBSC's cryptographic approach significantly mitigates risks associated with session hijacking, a common tactic among cybercriminals.

Sources

Original Report

THThe Hacker News
Read Original

Related Pings

MEDIUMPrivacy

Session Messenger - Protecting Privacy Without Metadata

Session is a new messaging app that prioritizes user privacy by eliminating phone numbers and metadata collection. It uses encryption and decentralized networks for secure communication. This approach addresses growing privacy concerns in digital communication.

Help Net SecurityΒ·
HIGHPrivacy

Health Insurance Lead Sites - Personal Data Sold Instantly

Health insurance lead generation sites are selling your personal data within seconds of form submission. This raises serious privacy concerns for consumers. Researchers tracked how data is misused and what you can do to protect yourself.

Help Net SecurityΒ·
MEDIUMPrivacy

WhatsApp - New Username Feature Enhances Privacy Control

WhatsApp is rolling out a username feature that enhances user privacy by allowing communication without phone numbers. This feature includes a new security measure known as the username key, providing users with greater control over their interactions.

Help Net SecurityΒ·
LOWPrivacy

Sticky-note Security - Gym's 80s Horror Show Revealed

A gym's security blunder led to a guest hijacking equipment by finding a password on a sticky note. This incident highlights the need for better security practices. Learn how to protect connected devices from similar vulnerabilities.

The Register SecurityΒ·
HIGHPrivacy

EPIC Calls to Halt Meta’s Facial Recognition Glasses Plans

EPIC and 63 organizations have united to stop Meta's plans for facial recognition in smart glasses. They argue it poses a serious privacy threat to everyone. This could lead to increased surveillance and privacy violations. Regulators are urged to take action.

EPIC Electronic PrivacyΒ·
HIGHPrivacy

Automation and NHI Security Risks - Key Findings Revealed

A new report highlights serious security risks linked to automation and non-human identities in enterprises. Over 40% of experts reported incidents last year. Organizations must improve management practices to protect their data.

SC MediaΒ·