The use of cookies by hackers is used to circumvent two-factor authentication

The latest trend in cybercrime is stealing cookies to bypass credentials and access private databases, according to Sophos. It is common advice to move sensitive data to cloud-based services or to use multifactor authentication to ensure safety. 

However, malicious actors have figured out how to replicate cookies connected to login information to hack unrefreshed web sessions. Infected emails, web services, browsers, web-based applications, and ZIP files can be exploited by hackers.

The most insidious aspect of this type of hack is that cookies can be used by nefarious individuals even when safety protocols are in place. Despite Chrome's encryption capabilities, Remote steals cookies from Google Chrome accounts.

Across a broader spectrum, cybercriminals can buy stolen cookies data from underground marketplaces, the publication reported. Lapsus$ reportedly purchased the Genesis marketplace, which contained login details for an Electronic Arts game developer. 

A group of hackers replicated EA employee login credentials and ultimately gained access to the company's networks, stealing 780 gigabytes of data. To extort EA, the group collected game and graphics engine source code details.

The Lapsus$ hack of Nvidia's database was also conducted in March. According to reports, the breach exposed login information for over 70,000 employees, as well as 1TB of company data, including schematics, drivers, and firmware details. 

As of now, there is no word on whether the hack was caused by cookie stealing. Software-as-a-service products such as Amazon Web Services, Azure, and Slack may also offer cookie-stealing opportunities.

A hacker may have basic access to a computer, but the hacker may trick a user into downloading malware or sharing sensitive information.

They tend to run persistently, which means their cookies don't expire often enough for their protocols to be secure.

For more stories like this

Explore our website