Malware is exploiting an undocumented Google OAuth endpoint called MultiLogin, allowing attackers to maintain access to Google services even after a password reset. The exploit, revealed by a threat actor named PRISMA and incorporated into various malware-as-a-service (MaaS) stealer families, enables session persistence and cookie generation. Specifically targeting Chrome’s token_service table, the malware extracts tokens and account IDs of logged-in Chrome profiles. Google acknowledged the attack method but stated that users can revoke stolen sessions by logging out of the affected browser. Enhanced Safe Browsing in Chrome is recommended for protection against phishing and malware downloads.
Trending
New Leadership Appointed for Kenya’s Electric Mobility Sector
Kenya Pipeline and Syokinet Unveil 1.6 Tbps Capacity on New Fiber Line
iPhone 16 Review: Apple’s Most Advanced Smartphone Yet, Redefining Performance and Innovation
Lobby Group Files Lawsuit Against Safaricom and CA Over Starlink
Vivo Y28 Launches in Kenya: Features MediaTek G85 SoC, 6,000mAh Battery – Price and Specifications
Selected Startups for Britam’s BetaLab Incubation Programme Revealed
TCL Unveils C855 QD-Mini LED TV in Kenya
TCL C655 QLED TV: Features and Availability in Kenya
Greenspoon Partners with Roam Electric Motorcycles for Speedier Deliveries
CloudPay, a payment solutions firm, raises $120 million in funding to expand its global customer base