1. All Stories
  2. Politics
  3. Economy
  4. World
  5. Nuclear
  6. Society/Culture
  7. Space/Science
  8. Sports
  9. Tourism
  10. Other Media
  11. Videos
  12. Photos
  13. Cartoons
  14. Interview
    • فارسی
    • عربی
    • Türkçe
    • עברית
    • Pусский
  • RSS
  • Telegram
  • Instagram
  • Twitter
  • Facebook
  • All Stories
  • Politics
  • Economy
  • World
  • Nuclear
  • Society/Culture
  • Space/Science
  • Sports
  • Tourism
  • Other Media
  • Videos
  • Photos
  • Cartoons
  • Interview

Hackers Exploit Chrome Kiosk Mode to Steal Google Account Passwords

  • September, 17, 2024 - 12:58
  • Space/Science news
Hackers Exploit Chrome Kiosk Mode to Steal Google Account Passwords

TEHRAN (Tasnim) – A new credential-stealing campaign using malware named StealC is forcing Chrome users into kiosk mode, locking them into full-screen windows and coercing them to enter their Google account passwords.

Space/Science

New research has uncovered a novel method threat actors are using to steal Google account credentials by leveraging a frustrating tactic that traps Chrome users in kiosk mode.

According to researchers at Open Analysis Lab (OALabs), the malware, dubbed StealC, prevents victims from exiting full-screen mode by disabling both the F11 and ESC keys, leaving them with no option but to input their Google account credentials.

The screen displays nothing but a Google login window, increasing the pressure on victims to comply, as they cannot escape the browser environment.

This new technique, which has been active since at least August 22, aims to frustrate users into giving away their credentials. Once the victim enters their Google account details, the StealC malware captures the information and sends it to the attackers.

“The technique involves launching the victim's browser in kiosk mode and navigating to the login page of the targeted service, usually Google,” OALabs researchers explained.

While the initial malware does not directly steal credentials, it serves as a "credential flusher," forcing users to enter their details. The actual credential theft occurs through StealC, which extracts the passwords from the Chrome browser’s credential store.

The campaign relies on a combination of known tools, primarily the Amadey hacking tool, which loads the StealC malware. OALabs researchers, with help from their threat intelligence partners at the Loader Insight Agency, have mapped out a typical attack roadmap, highlighting how these various components work together to compromise user accounts.

 
R1517/P42410
Read more
Hundreds of Chrome Extensions Found Secretly Uploading Millions of Private User Data
tasnim
tasnim
tasnim
  • About
  • Contact Us
  • Most Visited
  • Archive
Follow Us:
  • RSS
  • Telegram
  • Instagram
  • Twitter
  • Facebook

All Content by Tasnim News Agency is licensed under a Creative Commons Attribution 4.0 International License.