Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Yet Another Way to Bypass Google Chrome’s Encryption Protection
    Cybersecurity

    Yet Another Way to Bypass Google Chrome’s Encryption Protection

    adminBy adminMay 6, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Yet Another Way to Bypass Google Chrome's Encryption Protection
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In another sign that browsers continue to be a prime attack target, authors of the VoidStealer Trojan have uncovered a way to bypass a Chrome security feature designed to protect session cookies and other sensitive data.

    It’s the latest successful bypass of Chrome’s App-Bound Encryption (ABE), introduced by Google in July 2024 and compatible with other Chromium-based browsers that also use ABE, like Microsoft Edge, Opera, Vivaldi, Brave, and others, according to Kaspersky.

    Google introduced ABE specifically to protect cookie data against infostealers on Windows systems. As the company explains, Google uses the highest level protections the operating system provides — like Keychain services in macOS and system-provided wallets on Linux systems — to encrypt and protect cookies and other sensitive browser data. The problem with the equivalent Data Protection API (DPAPI) feature in Windows is that it does not protect stored data like cookies and passwords from being accessed by malicious applications like infostealers, masquerading as a legitimate, logged in user. ABE aimed to fix the problem by ensuring that only the Chrome application itself could decrypt stored data rather than any process running as the legitimate user.

    Related:Silver Fox Springs Tax-Themed Attacks on Orgs in India, Russia

    Bypassing Browser Protections

    “The architects of this feature assumed that to access ABE-protected browser data, an infostealer would either need to escalate its privileges to system-level, or inject malicious code directly into Chrome,” Kaspersky researcher Alanna Titterington said. “In theory, this should have made attacking Chrome significantly harder and reduced the effectiveness of mass-market infostealers,” she said.

    In reality however, security researchers and malware authors have found ways to bypass the protection almost as soon as Google implemented the feature in Chrome. The authors of infostealers like Meduza Stealer, Whitesnake, Lumma Stealer, and Lumar have all successfully continued to harvest cookie data and other secrets from Chrome, even after Google implemented ABE. 

    And researchers have demonstrated ways to do it as well. Titterington pointed to an effort by researcher Alex Hagenah, who showed how an attacker could extract cookies, passwords, payment methods, and tokens from Chrome even with ABE. His technique combined fileless, in-memory execution, process hollowing, direct system calls, and other stealth techniques to access encrypted data as if it were legitimate Chrome activity. Last year, CyberArk disclosed how its researchers developed a new so-called C4 attack technique that allowed them to decrypt Chrome cookies, even as a user with low privileges.

    Related:WhatsApp Leaks User Metadata to Attackers

    A Different Tactic

    The tactic that the authors of VoidStealer employ is different from previous ABE bypasses, according to Titterington. It targets the moment when Chrome needs to decrypts data and uses it to sign into a website or to access saved credentials, she noted. To do this, Chrome exposes the master key in plaintext in browser memory; VoidStealer authors figured out a way to take advantage of that brief window of opportunity. 

    To capture that moment the malware attaches to the browser as a debugger, which developers use as a legitimate mechanism for troubleshooting. It then identifies the exact point in the browser’s execution where decryption occurs and pauses the process at that instant. This allows the attacker to extract the encryption key directly from memory, effectively bypassing the protections designed to keep it secure.

    The VoidStealer bypass tactic is another indication of how browsers and browser extension have become a popular target for attackers. With enterprises moving more of their workflows into Web applications, browsers have become repositories of sorts for authentication token, credentials, financial information and a variety of other sensitive data.

    Related:Two-Factor Authentication Breaks Free From the Desktop

    bypass Chromes encryption Google protection
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow to Increase It in the Era of AI
    Next Article Google Says AI Creative Should Help Brands Differentiate, Not Blend In
    admin
    • Website

    Related Posts

    Google tests new conversational ad formats in AI Mode and Search

    May 21, 2026

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    What is PPC? A starter guide to pay-per-click advertising

    May 21, 2026

    WordPress 7.0 Launches With Native AI Integration

    May 21, 2026

    Best AI search analytics tools for marketing teams

    May 21, 2026

    Google tests new conversational ad formats in AI Mode and Search

    May 21, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,219)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (306)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    What is PPC? A starter guide to pay-per-click advertising

    May 21, 2026

    WordPress 7.0 Launches With Native AI Integration

    May 21, 2026

    Best AI search analytics tools for marketing teams

    May 21, 2026
    Most Popular
    • What is PPC? A starter guide to pay-per-click advertising
    • WordPress 7.0 Launches With Native AI Integration
    • Best AI search analytics tools for marketing teams
    • Google tests new conversational ad formats in AI Mode and Search
    • How to measure AI search visibility: KPIs & reporting
    • Mueller Explains Why Google Uses Markdown On Dev Docs
    • Google Marketing Live 2026: Everything you need to know
    • Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.