Hijacking Google Accounts with Sneaky Malware: New Exploit Allows Access Despite Password Reset

A recently discovered exploit that allows hackers to maintain access to Google services even after a password reset. The exploit uses an undocumented Google OAuth endpoint called MultiLogin to hijack user sessions and generate new authentication cookies. This allows threat actors to regenerate expired Google authentication cookies, even after the legitimate owner has reset their password or logged out. The vulnerability has been adopted by multiple information-stealing malware families and is currently being sold by six malware groups. Google has acknowledged the existence of the attack method but has not provided a solution to protect users.

Related reads

Popular posts from this blog

Meta CTO Reveals Latest Updates on AR Glasses: AI-Powered and Beyond!

GTA 6: The Most Anticipated Game Release in History?

Google Unveils Revolutionary Password Security Feature for iPhone Users