That is a notable development, but it is important to keep the claim in context.
What the report is saying
According to Gen Digital’s write-up, the malware uses a debugger-based method with hardware breakpoints to capture the browser’s
v20_master_key from memory after Chrome’s newer Application-Bound Encryption protections are in place.
If that description is accurate, the interesting part is not that ABE is “broken” in a universal sense, but that an infostealer found a way to extract the key at runtime from the user context without relying on the more obvious approaches such as direct code injection or admin-level privilege escalation.
Why that matters
- It shows that raising the protection level around stored browser secrets does not eliminate theft risk once malware is already running on the system.
- A memory/runtime attack can bypass protections that are effective against simpler grab-and-decrypt methods.
- Avoiding code injection may reduce some behavioral detections, depending on the security product and its telemetry.
What it does not mean
- It does not mean all ABE-protected data is trivially exposed.
- It does not mean every stealer now has this capability.
- It does not mean browser encryption is useless; it still increases the cost and complexity for attackers.
Practical takeaway
For defenders, the main lesson is the same one seen repeatedly with infostealers: once malware executes under the user’s session, browser-stored credentials, cookies, and tokens are at much higher risk regardless of how well they are protected at rest.
That shifts the focus toward preventing initial execution and detecting suspicious runtime behavior, for example:
- Strong exploit and script-based attack prevention
- Good behavior monitoring / EDR-style detection
- Reducing credential and session-token exposure in browsers where possible
- Using MFA, while remembering that session theft can still weaken its benefit
Bottom line
If the vendor analysis holds up, this is a meaningful evolution in infostealer tradecraft because it targets the key during use rather than trying to defeat storage protection directly. The broader security message is that endpoint compromise remains the real problem, and browser encryption alone cannot compensate for malware already running on the machine.
Source