#1 Trending Cybersecurity News & Magazine
Sunday, December 3, 2023
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    hacktivist propaganda

    Manipulating Hacktivist Propaganda to Collect Cyber Behavioral Threat Information

    Tech Trends

    The Top 5 Tech Trends to Watch Out for in 2024

    science history institute data leak

    NoEscape Ransomware Group Strikes Again, Claims Science History Institute Data Breach

    Virtual Currency Mixer Sinbad.io

    US Treasury Sanctions Sinbad.io for Alleged Role in Lazarus Group’s Money Laundering

    Honey Birdette data breach

    Honey Birdette Data Breach Linked to 8Base Hacker Group, Lingerie Brand Yet to Confirm

    general electric data sale

    General Electric Data Breach: Hacker Claims Sale of Leaked GE Information

    First American Title Insurance breach

    First American Title Insurance Settles $1M Breach Case with NY Authorities

    play ransomware attack

    Play Ransomware Group Lists 17 Victims, 14 US-Based Companies Named

    Okta data breach incident

    Okta Data Breach: Hackers Access Data of All Customer Support Users, Says Firm

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    AI Security Guidelines

    Rethinking AI For Cybersecurity: The UK & US Reveals New Guidelines For AI Security

    Cyber Insurance

    Cyber Insurance and Real-Time Threat Dashboard to Mend the Gaps in Near Future

    Pledge to Stop Ransom Payment

    Pledge to Stop Ransom Payment Awaits Consensus from all Members of the CRI

    Executive Order on Artificial Intelligence

    Biden Administration’s AI Directive: A Blueprint for Ethical Use and Enhanced Cybersecurity

    Cyber Resilience

    Towards Cyber Resilience: A Data-Centric Approach to Security

    CybleGrowCon

    Cyble Partner Network GrowCon 2023: Uniting Cybersecurity Leaders

    GRC, What is GRC

    What is GRC (Governance, Risk & Compliance): A Beginner’s Guide

    Facial Recognition Ban

    New York State Education Department Bans Facial Recognition Scans in Schools

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Countdown to TimeAI Summit 2023

    Countdown to TimeAI Summit 2023: Unveiling the Future of Artificial Intelligence in Dubai

    Emerging Tech Summit

    The Emerging Tech Summit – Saudi Arabia 2023

    Business Cybersecurity

    Prioritizing Business Cybersecurity Plans During Mergers and Acquisitions

    TimeAI Summit

    TimeAI Summit is Uniting Tech Giants and Visionaries in Dubai to Shape the Future of AI

    CyberDSA 2023

    CyberDSA 2023: Forging a Resilient Digital Future Through Unprecedented Collaboration

    Summit MENA 2023

    MENA Summit 2023: Exploring the Future of Digital Identity & Authentication

    Cyble Raises 24 Million in Series B Funding

    Cyble Raises 24 Million in Series B Funding: Leveraging AI and Threat Intelligence to Revolutionize Cybersecurity

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Bureau Raises $16.5M in Series A Funding

    Bureau Raises $16.5M in Series A Funding to Drive Global Expansion and Combat Cyber Fraud

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
SUBSCRIBE
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    hacktivist propaganda

    Manipulating Hacktivist Propaganda to Collect Cyber Behavioral Threat Information

    Tech Trends

    The Top 5 Tech Trends to Watch Out for in 2024

    science history institute data leak

    NoEscape Ransomware Group Strikes Again, Claims Science History Institute Data Breach

    Virtual Currency Mixer Sinbad.io

    US Treasury Sanctions Sinbad.io for Alleged Role in Lazarus Group’s Money Laundering

    Honey Birdette data breach

    Honey Birdette Data Breach Linked to 8Base Hacker Group, Lingerie Brand Yet to Confirm

    general electric data sale

    General Electric Data Breach: Hacker Claims Sale of Leaked GE Information

    First American Title Insurance breach

    First American Title Insurance Settles $1M Breach Case with NY Authorities

    play ransomware attack

    Play Ransomware Group Lists 17 Victims, 14 US-Based Companies Named

    Okta data breach incident

    Okta Data Breach: Hackers Access Data of All Customer Support Users, Says Firm

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    AI Security Guidelines

    Rethinking AI For Cybersecurity: The UK & US Reveals New Guidelines For AI Security

    Cyber Insurance

    Cyber Insurance and Real-Time Threat Dashboard to Mend the Gaps in Near Future

    Pledge to Stop Ransom Payment

    Pledge to Stop Ransom Payment Awaits Consensus from all Members of the CRI

    Executive Order on Artificial Intelligence

    Biden Administration’s AI Directive: A Blueprint for Ethical Use and Enhanced Cybersecurity

    Cyber Resilience

    Towards Cyber Resilience: A Data-Centric Approach to Security

    CybleGrowCon

    Cyble Partner Network GrowCon 2023: Uniting Cybersecurity Leaders

    GRC, What is GRC

    What is GRC (Governance, Risk & Compliance): A Beginner’s Guide

    Facial Recognition Ban

    New York State Education Department Bans Facial Recognition Scans in Schools

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    US Cybersecurity Regulations: Tracing the Past and Predicting the Future

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Countdown to TimeAI Summit 2023

    Countdown to TimeAI Summit 2023: Unveiling the Future of Artificial Intelligence in Dubai

    Emerging Tech Summit

    The Emerging Tech Summit – Saudi Arabia 2023

    Business Cybersecurity

    Prioritizing Business Cybersecurity Plans During Mergers and Acquisitions

    TimeAI Summit

    TimeAI Summit is Uniting Tech Giants and Visionaries in Dubai to Shape the Future of AI

    CyberDSA 2023

    CyberDSA 2023: Forging a Resilient Digital Future Through Unprecedented Collaboration

    Summit MENA 2023

    MENA Summit 2023: Exploring the Future of Digital Identity & Authentication

    Cyble Raises 24 Million in Series B Funding

    Cyble Raises 24 Million in Series B Funding: Leveraging AI and Threat Intelligence to Revolutionize Cybersecurity

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Alarming 66% Quarterly Growth in Ransomware Attacks Notes Cyble’s Q2-2023 Ransomware Report

    Bureau Raises $16.5M in Series A Funding

    Bureau Raises $16.5M in Series A Funding to Drive Global Expansion and Combat Cyber Fraud

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Threat to Security: Lumma Infostealer Unlocks Unstoppable Access to Google Cookies

The implications of this discovery go far beyond personal Gmail accounts. Numerous corporate email addresses linked to a variety of organizations can also be accessed through Google.

Samiksha Jain by Samiksha Jain
November 10, 2023
in Firewall Daily
0
Lumma Infostealer
614
SHARES
3.4k
VIEWS
Share on LinkedInShare on Twitter

In a significant development, the creators of the well-known Infostealer group, Lumma, have reportedly made a groundbreaking discovery. They claim to have devised a method to extract Google cookies from infected computers in a way that these cookies do not expire or become invalid, even if the user changes their password.

This, if true, can cause a paradigm shift in cybercriminal activities, potentially enabling hackers to gain unauthorized access to a broader spectrum of accounts and execute more severe attacks.

You might also like

Manipulating Hacktivist Propaganda to Collect Cyber Behavioral Threat Information

The Top 5 Tech Trends to Watch Out for in 2024

NoEscape Ransomware Group Strikes Again, Claims Science History Institute Data Breach

It is vital to highlight that the implications of this discovery go far beyond personal Gmail accounts. Numerous corporate email addresses linked to a variety of organizations can also be accessed through Google. These organizations could now be at an increased risk of suffering from ransomware and other cyberattacks.

Unprecedented Cybercriminal Capabilities of Lumma Infostealer

This significant advancement in cybercriminal techniques, as revealed by Alon Gal, Co-Founder & CTO at Hudson Rock, is a testament to the growing sophistication of the creators behind it.

Unlike conventional methods where password changes nullify stolen credentials, this breakthrough grants hackers sustained and unimpeded access, creating an avenue for infiltrating a multitude of accounts and executing substantial attacks.

“In addition to that, Google cookies are not just for email accounts but rather for a wide range of services which will now be much more accessible to hackers,” highlighted Gal in his detailed post.

Lumma Infostealer
Source: Alon Gal

“If true, exfiltration of cookies that cannot be revoked from Google will mark a significant shift in the cybercrime ecosystem, enabling hackers to infiltrate Google-related services with ease and perform various cyberattacks,” commented Gal when queried about this groundbreaking development.

Beyond the immediate threat to personal Gmail accounts, the gravity of the situation extends to numerous corporate email addresses associated with organizations.

The potential consequences are severe, encompassing an elevated risk of ransomware attacks and other sophisticated cyber intrusions that could target businesses and institutions.

Broader Threat Landscape

It’s imperative to recognize that the scope of this threat isn’t limited to email services alone; it encompasses a broad spectrum of interconnected online platforms reliant on Google cookies. This newfound accessibility intensifies the risk, presenting an unprecedented challenge to the cybersecurity community.

An intriguing question arises: Can the sessions be revoked, rendering the stolen cookies useless? Gal addresses this, explaining, “In cookies stolen by stealers so far, yes, this is the case. However, the group behind Lumma now claims to have exfiltrated some kind of cookies that are irrevocable, a very interesting claim.”

While it remains uncertain if Google is considering the incident response perspective, it appears the incident has yet to reach the tech giant’s attention.

Although it’s unclear whether Google is currently addressing the incident from a response standpoint, it seems that the tech giant has not yet been made aware of this specific situation.

However, this threat’s severity is amplified by the simplicity it offers hackers to execute complex cyberattacks. The danger is even more pronounced considering that these cookies might not be rendered invalid by standard practices like password resets.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: Cyber ThreatCyberattackGoogle CookiesLumma InfostealerThe Cyber ExpressThe Cyber Express News
Previous Post

Potential Data Breach at Chess.com, 800K User Records May Be Compromised

Next Post

Financial Stability Threatened: World’s Largest Bank ICBC Hit by Ransomware Attack, Impacts US Treasury Market

Samiksha Jain

Samiksha Jain

Related Posts

hacktivist propaganda
Firewall Daily

Manipulating Hacktivist Propaganda to Collect Cyber Behavioral Threat Information

by Ishita Tripathi
December 1, 2023
Tech Trends
Cybersecurity News

The Top 5 Tech Trends to Watch Out for in 2024

by Editorial
December 1, 2023
science history institute data leak
Data Breach News

NoEscape Ransomware Group Strikes Again, Claims Science History Institute Data Breach

by Ishita Tripathi
November 30, 2023
Virtual Currency Mixer Sinbad.io
Cybersecurity News

US Treasury Sanctions Sinbad.io for Alleged Role in Lazarus Group’s Money Laundering

by Samiksha Jain
November 30, 2023
Honey Birdette data breach
Firewall Daily

Honey Birdette Data Breach Linked to 8Base Hacker Group, Lingerie Brand Yet to Confirm

by Ashish Khaitan
November 30, 2023
Next Post
ICBC ransomware attack

Financial Stability Threatened: World's Largest Bank ICBC Hit by Ransomware Attack, Impacts US Treasury Market

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Issue is Out. Subscribe Now

Cybersecurity Magazine



Follow Us On Google News

Latest Cyber News

hacktivist propaganda
Firewall Daily

Manipulating Hacktivist Propaganda to Collect Cyber Behavioral Threat Information

December 1, 2023
Tech Trends
Cybersecurity News

The Top 5 Tech Trends to Watch Out for in 2024

December 1, 2023
science history institute data leak
Data Breach News

NoEscape Ransomware Group Strikes Again, Claims Science History Institute Data Breach

November 30, 2023
Virtual Currency Mixer Sinbad.io
Cybersecurity News

US Treasury Sanctions Sinbad.io for Alleged Role in Lazarus Group’s Money Laundering

November 30, 2023

Categories

Web Stories

Top 10 CISOs to Follow in 2023
Top 10 CISOs to Follow in 2023
Top 10 Ransomware Gangs in 2023
Top 10 Ransomware Gangs in 2023
Top 5 IoT Security Risks in 2023
Top 5 IoT Security Risks in 2023
Top 10 CTF Platforms in 2023
Top 10 CTF Platforms in 2023
Types of Risks Covered by Cyber Insurance
Types of Risks Covered by Cyber Insurance

About

The Cyber Express by Cyble

#1 Trending Cybersecurity News and Magazine

The Cyber Express  by Cyble is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

For Events & Conferences related information: [email protected]

 

Quick Links

  • About Us
  • Advertise With Us
  • Contact Us
  • Editorial Calendar

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News
  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2023 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • World CyberCon India 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • Products
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)

© 2023 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by Cyber Insurance