Hijacking Google Accounts with Sneaky Malware: New Exploit Allows Access Despite Password Reset

A recently discovered exploit that allows hackers to maintain access to Google services even after a password reset. The exploit uses an undocumented Google OAuth endpoint called MultiLogin to hijack user sessions and generate new authentication cookies. This allows threat actors to regenerate expired Google authentication cookies, even after the legitimate owner has reset their password or logged out. The vulnerability has been adopted by multiple information-stealing malware families and is currently being sold by six malware groups. Google has acknowledged the existence of the attack method but has not provided a solution to protect users.

Related reads

Popular posts from this blog

Apple's Next Gen iPad Lineup: M3 MacBook Air and Refined iPad Pros on the Way?

Intel Unveils Arrow Lake Gaming CPUs with AI Accelerators, Lunar Lake Brings Huge IPC Uplifts

MediaTek Optimizes Chips for Next-Gen Gemini Nano Devices