- Feb 1, 2013
- 970
Eset has exlained it:Any technical explanation?
It's actually on for all browsingEset has exlained it:
ESET Smart Security Premium and ESET Internet Security contain a built-in list of predefined websites that will trigger a secure browser to open. You can add a website or edit the list of websites in the product configuration.
They don’t mention managing access to credentials anywhere. They just open certain websites in secure environment. If you always bank via this feature, cookies may be protected. But criminals will be mainly interested in opening your email. From there, they will gain access to everything else. They will also exfiltrate saved passwords in various managers.
It only gets triggered when you open a banking website (as per Eset website). And even if it was triggered on all sites, Eset doesn’t prevent programs from accessing your browsers repository. You should be able to create a HIPS rule that will do that but banking protection is a gimmick and won’t help you against these attacks. Attackers will copy the whole browser repository and Eset will just be sitting there.It's actually on for all browsing
I know how this works, I just didn't study the malware's behaviour. Even priviledge escalation is not necessary I think.. thanks!It only gets triggered when you open a banking website (as per Eset website). And even if it was triggered on all sites, Eset doesn’t prevent programs from accessing your browsers repository. You should be able to create a HIPS rule that will do that but banking protection is a gimmick and won’t help you against these attacks. Attackers will copy the whole browser repository and Eset will just be sitting there.
You see those switches that say “Enhanced Memory Protection, Keyboard protection”.
The cookies are neither in memory, nor is is the user typing them. They are in this folder:
%APPDATA%/Google/Chrome.
It is very common behaviour to copy the browser repositories and even cheap RATs like njRAT which is widely available cracked would do the job. UAC doesn’t work against njRAT and it would copy information from ALL user accounts even if you set the folder only accessible by a specific user.I know how this works, I just didn't study the malware's behaviour. Even priviledge escalation is not necessary I think.. thanks!
Despite Edge uses Credential Manager sth not being used by other browsers, all browsers repos login data can bring hackers the actual credentialsIt is very common behaviour to copy the browser repositories and even cheap RATs like njRAT which is widely available cracked would do the job. UAC doesn’t work against njRAT and it would copy information from ALL user accounts even if you set the folder only accessible by a specific user.
More recent stealers target some third party managers as well. So yeah, caution and AV identification is the way to go definitely.I wonder if cr
Despite Edge uses Credential Manager sth not being used by other browsers, all browsers repos login data can bring hackers the actual credentials
.
At last, caution and malware definitions is the way to go i guess.
The best advise is to use a laptop based on linux/mac/chrome os for managing this content and never open important accounts on a Windows-based PC. If you don’t click on links in emails, it greatly reduces the risk.
I wonder if it’s that easy to steal and decrypt credentials data in Linux too.More recent stealers target some third party managers as well. So yeah, caution and AV identification is the way to go definitely.
There are some stealers.I wonder if it’s that easy to steal and decrypt credentials data in Linux too.
it's interesting though, that when having saved passwords in Windows 11 browsers, and tried using browserpassview utility by Nirsoft, I noticed the following:There are some stealers.
New stealthy OrBit malware steals data from Linux devices
A newly discovered Linux malware is being used to stealthily steal information from backdoored Linux systems and infect all running processes on the machine.www.bleepingcomputer.com
A couple of months ago, the popular tech blogger Linus Tech was hacked. All three of his YouTube channels (the biggest of which boasts over 15 million subscribers) fell into the hands of cybercriminals, who began broadcasting streams with crypto-scam ads. How did the hackers manage to gain access to the channels? Didn’t the famous tech-blogger protect his accounts with a strong password and two-factor authentication? Of course he did (at least, that’s what he himself says).
Linus Tech fell victim to a pass-the-cookie attack, a common method for targeting YouTubers. In this post we take a closer look at the objectives and motives behind such attacks, how hackers can access channels without knowing password and second factor, what Google’s doing about it, and how not to fall victim to this attack.