Google Responds to Detection of Session Token Malware Capable of Hijacking Accounts: Report

The zero-day exploit allows malicious users to regenerate an authentication cookie to log in to a user's account, even after a password change.

Advertisement
Written by David Delima, Edited by Siddharth Suvarna | Updated: 3 January 2024 15:17 IST
Highlights
  • Hackers can use stolen session tokens to gain access to a user's account
  • The exploit allows hackers to gain long-term access to Google accounts
  • Users can revoke the sessions by logging out of the affected browser

Users can enable Enhanced Safe Browsing on Chrome to avoid malware downloads

Photo Credit: Unsplash/ @firmbee

Malware designed to steal information from users and hijack their Google accounts is being exploited by multiple malicious groups — even after a password has been reset — according to security researchers. The exploit is reportedly aimed at Windows computers. Once the device is infected, it uses a technique used by "info stealers" to exfiltrate the login session token — assigned to a user's computer when they log in to their account — and upload it to the cybercriminal's server.

According to a report published by researchers at CloudSEK, the malware was first launched by threat group PRISMA in October 2023, and uses the search giant's OAuth endpoint called MultiLogin that is used by Google to allow users to switch between user profiles on the same browser or use multiple login sessions simultaneously. The malware uses auth-login tokens from a user's Google accounts that are logged in on the computer. The necessary details are decrypted with the help of a key that is stolen from the UserData folder in Windows, as per the report.

Using the stolen login session tokens, malicious users can even regenerate an authentication cookie to log in to a user's account after it has expired — it can even be reset once, when a user changes their password. As a result, the malware operators can retain access to a user's account. Threat intelligence group Hudson Rock has provided a demonstration of the flaw being exploited.

Advertisement

 

Meanwhile, BleepingComputer points out that various malware creators have already started to use the exploit to gain access to user data — on November 14, the Lumma stealer was updated to take advantage of the flaw, followed by Rhadamanthys (November 17), Stealc (December 1), Medusa (December 11), RisePro (December 12), and Whitesnake (December 26).

Advertisement

In a statement to 9to5Google, the search giant said that it routinely upgraded its defences against the techniques used by malware, and that compromised accounts detected by the company have been secured.

Google also points out that users can revoke or invalidate the stolen session tokens by either logging out of the browser on a device that has been infected with the malware, or by accessing their devices page in their account settings and remotely sign out of those sessions. Users can also scan their computers for malware and enable the Enhanced Safe Browsing setting in Google Chrome to avoid downloading malware to their computers, according to the company.

Advertisement


Is the Samsung Galaxy Z Flip 5 the best foldable phone you can buy in India right now? We discuss the company's new clamshell-style foldable handset on the latest episode of Orbital, the Gadgets 360 podcast. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.
 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Google, Malware, PRISMA, Google account
Advertisement

Related Stories

Popular Mobile Brands
  1. OTT Releases This Week: The Bads of Bollywood, Article 370, and More
  2. Amazon Great Indian Festival Sale 2025: Check Early Deals on Tablets
  3. Nothing Ear 3 With 'Super Mic' Feature, Up to 45dB ANC Launched: See Price
  4. Amazon Sale 2025: Check Top Deals on These iQOO Smartphones
  5. iQOO 15 Design Leak Reveals Colour-Changing Panel: See Benchmark Scores
  6. These Samsung Phones Will Get Price Drops Ahead of Festive Season
  7. Vivo X300 Series Official Images Surface Ahead of China Launch
  8. DJI Mini 5 Pro With 1-Inch Camera Sensor Launched at This Price
  9. Biggest Offers on Smartphones During Amazon Great Indian Festival Sale
  10. These Companies Fired Over 10K Employees Between July and September 2025
  1. Google Home Premium Subscription Could Reportedly Replace Nest Aware, Introduce AI Features
  2. Xiaomi 17 Series Pre-Orders Open in China: Specs and Everything We Know So Far
  3. Redmi 15C 5G With 50-Megapixel Rear Camera, 6,000mAh Battery Launched: Price, Specifications
  4. Xiaomi Pad 8 Series Confirmed to Launch This Month Alongside Xiaomi 17; Pre-Reservations Begin
  5. iQOO 15 Design Teased, Pre-Reservation Begins Ahead of China Launch in October
  6. Vivo X300, Vivo X300 Pro Design and Colourways Revealed Ahead of Launch in China
  7. Amazon Sale 2025: Biggest Offers on iPhone 15, Samsung Galaxy S24 Ultra, OnePlus 13R, and More Revealed
  8. Oppo Find X9 Renders Reveal Design, Dolby Vision Support Ahead of October Launch
  9. Nvidia Invests $5 Billion in Intel, to Jointly Develop AI Infrastructure and PC Chips
  10. Google Rolls Out Gemini in Chrome Browser to Introduce AI Agentic Capabilities, Safety Features For Users
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.