Hijacking Google Accounts with Sneaky Malware: New Exploit Allows Access Despite Password Reset
A recently discovered exploit that allows hackers to maintain access to Google services even after a password reset. The exploit uses an undocumented Google OAuth endpoint called MultiLogin to hijack user sessions and generate new authentication cookies. This allows threat actors to regenerate expired Google authentication cookies, even after the legitimate owner has reset their password or logged out. The vulnerability has been adopted by multiple information-stealing malware families and is currently being sold by six malware groups. Google has acknowledged the existence of the attack method but has not provided a solution to protect users.
Related reads
- This dangerous malware is able to hijack your Google Account by reviving cookies
- New Google Cookies Exploit Allows Access After Password Reset
- Malware Using Google MultiLogin Exploit to Maintain Access Despite Password Reset - The Hacker News
- This sneaky malware lets hackers access Google accounts without a password — here's how
- Malware abuses Google OAuth endpoint to ‘revive’ cookies, hijack accounts