It was a stealer malware indeed.
I'm guessing probably not, but I think most AVs wouldn't be able to protect those cookies, maybe mark it as suspicious behavior. Bad actors will find ways to get around the antivirus. This could make an interesting discussion though..Anyone here know if Webroot Identity Shield could have protected those session cookies?
There is a way to control access to these cookies with Kaspersky Application Control and premium Avast has a way to block access to browser repositories. So users are not really powerless.I'm guessing probably not, but I think most AVs wouldn't be able to protect those cookies, maybe mark it as suspicious behavior. Bad actors will find ways to get around the antivirus. This could make an interesting discussion though..
They are, look at StealC analysis. Scroll down to the tables to see what’s affected. The browser’s own password manager is what will get exfiltrated first. I’ve played with malware of this sort and it takes seconds, but also it can be tested on any.run. Once you execute it, both passwords and more crucially, session cookies from a huge variety of browsers are gone.So, what about browser-based password managers like Bitwarden or even Google's/Edge's own password manager? Are they also vulnerable to this attack?
yes, but fake pop-ups and login pages are more commonSo, what about browser-based password managers like Bitwarden or even Google's/Edge's own password manager? Are they also vulnerable to this attack?
In 10 years, only 55 security exploits have been documented for ChromeOS. Apple’s OSX has 2,212 listed vulnerabilities from 1999 until today and Microsoft Windows has 6,814 since 1999.The best advise is to use a laptop based on linux/mac/chrome os for managing this content and never open important accounts on a Windows-based PC. If you don’t click on links in emails, it greatly reduces the risk.
A premium Chromebook makes a great gift.The vulnerabilities in Chrome and Chrome OS are also relatively short-lived and hard to uncover/exploit.
The platform’s small and quick updates leave little room for CVE exposure.
It wouldn’t.I wonder if ESET banking protection which is by default always on, would block that malware from reading the credentials from cookies.