{"id":23701,"date":"2024-01-13T13:10:49","date_gmt":"2024-01-13T21:10:49","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/01\/13\/news-17431\/"},"modified":"2024-01-13T13:10:49","modified_gmt":"2024-01-13T21:10:49","slug":"news-17431","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/01\/13\/news-17431\/","title":{"rendered":"Info-stealers can steal cookies for permanent access to your Google account"},"content":{"rendered":"\n<p>Hackers have found a way to gain unauthorized access to Google accounts, bypassing any <a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\">multi-factor authentication (MFA)<\/a> the user may have set up. To do this they steal authentication cookies and then extend their lifespan. It doesn\u2019t even help if the owner of the account changes their password.<\/p>\n<p>Since the discovery of the exploit, numerous white and black hat security researchers have looked into and discussed the issue. As a result, the exploit is now built into various <a href=\"https:\/\/www.malwarebytes.com\/blog\/detections\/spyware-infostealer\">information stealers<\/a>.<\/p>\n<p>Cookies are used to track users across websites and remember information about their visit. Authentication cookies are in essence pieces of data that the browser sends to a site to identify the user and check whether they are logged in. Usually these cookies have an expiration date after which the user will be asked to log in.<\/p>\n<p>Persistent cookies enable a continuous access to Google services, even after the user resets their password. This exploit allows the generation of persistent Google cookies by using a Google Application Programming Interface (API) designed for synchronizing accounts across different Google services to bring back to life expired authentication cookies. <\/p>\n<p>A Google account provides access to Google services like Gmail, Google Calendar, and Google Maps, but also Google Ads and YouTube.<\/p>\n<p>In a statement Google responded:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cWe routinely upgrade our defenses against such techniques and to secure users who fall victim to malware. In this instance, Google has taken action to secure any compromised accounts detected.\u201d<\/p>\n<\/blockquote>\n<p>However, some info stealers have <a href=\"https:\/\/www.cloudsek.com\/blog\/compromising-google-accounts-malwares-exploiting-undocumented-oauth2-functionality-for-session-hijacking\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">reportedly<\/a> already been updated to counter Google&#8217;s fraud detection measures. <\/p>\n<p>Sources familiar with this issue have told <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-malware-abusing-api-is-standard-token-theft-not-an-api-issue\/\">BleepingComputer<\/a> that Google believes the API is working as intended and and that no vulnerability is being exploited by the malware, which implies that Google isn&#8217;t working on a more permanent fix for this problem.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-review-devices\">Review devices<\/h3>\n<p>To check whether someone has accessed your account, you can view which computers, phones, or other devices that were signed in to your Google Account recently.<\/p>\n<ol start=\"1\">\n<li>Go to your&nbsp;<a href=\"https:\/\/myaccount.google.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google Account<\/a>.<\/li>\n<li>On the left navigation panel, select&nbsp;<strong>Security<\/strong>&nbsp;.<\/li>\n<li>On the&nbsp;<em>Your devices<\/em>&nbsp;panel, select&nbsp;<strong>Manage all devices<\/strong>.<\/li>\n<li>You&#8217;ll see devices where you\u2019re currently signed in to your Google Account or have been in the last few weeks. For more details, select a device or a session.<\/li>\n<li>Devices or sessions where you\u2019re signed out will have a \u201cSigned out\u201d indication.<\/li>\n<li>If multiple sessions appear for the same device type, they might all be on one device or multiple devices. Review their details, and if you\u2019re not sure all the sessions are from your devices, sign out on them.<\/li>\n<\/ol>\n<h3 class=\"wp-block-heading\" id=\"h-remediate\">Remediate<\/h3>\n<p>If you think your account has been compromised, you will have to sign out of all browsers to invalidate the current session tokens and then reset your password. Next you will need to sign back in to generate new tokens. Only this stops the unauthorized access because it invalidates the old tokens.<\/p>\n<p>The steps outlined below are for administrators who manage Google Accounts for a company, school, or other group. As an administrator, you can sign a user out of a managed Google Account, such as Google Workspace or Cloud Identity.<\/p>\n<p>To reset a user&#8217;s sign-in cookies:<\/p>\n<ol start=\"1\">\n<li><a href=\"https:\/\/admin.google.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Sign in<\/a>&nbsp;to your&nbsp;<a href=\"https:\/\/support.google.com\/a\/answer\/182076\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google Admin console<\/a>. Sign in using an&nbsp;<em>administrator account<\/em>, not your current account.<\/li>\n<li>In the Admin console, go to <strong>Menu<\/strong>&nbsp;&gt;&nbsp;<strong>Directory &gt; Users<\/strong>.<\/li>\n<li>In the&nbsp;<strong>Users<\/strong>&nbsp;list, find the user. If you need help, go to&nbsp;<a href=\"https:\/\/support.google.com\/a\/answer\/33324\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Find a user account<\/a>.<\/li>\n<li>Click the user&#8217;s name to open the user&#8217;s account page.<\/li>\n<li>Click&nbsp;<strong>Security &gt; Sign-in cookies &gt; Reset<\/strong>.<\/li>\n<\/ol>\n<p>What might help stop this abuse is if Google speeds up the <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/12\/chrome-starts-the-countdown-to-the-end-of-tracking-cookies\">announced end of tracking cookies<\/a>. Obviously, we think it&#8217;s best to keep these information stealers off your computer.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/01\/info-stealers-can-steal-cookies-for-permanent-access-to-your-google-account\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Several info-stealers have incorporated an exploit that allows them to gain permanent access to your Google account <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10599,10435,22783,1670,30709,10600,32],"class_list":["post-23701","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-authentication","tag-cookies","tag-exploits-and-vulnerabilities","tag-google","tag-info-stealers","tag-mfa","tag-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23701"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23701\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23701"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}