Malware is exploiting an undocumented Google OAuth endpoint called MultiLogin, allowing attackers to maintain access to Google services even after a password reset. The exploit, revealed by a threat actor named PRISMA and incorporated into various malware-as-a-service (MaaS) stealer families, enables session persistence and cookie generation. Specifically targeting Chrome’s token_service table, the malware extracts tokens and account IDs of logged-in Chrome profiles. Google acknowledged the attack method but stated that users can revoke stolen sessions by logging out of the affected browser. Enhanced Safe Browsing in Chrome is recommended for protection against phishing and malware downloads.
Newsflash
- Google Offers Gemini Code Assist Free to Individual Developers
- Alibaba Unveils Wan 2.1 AI Model to Compete with OpenAI
- Internet Disruptions Hit Nairobi Amid Escalating Feud Between City Hall and Kenya Power
- Epson Appoints New President & CEO to Drive Global Innovation and Growth
- Ethiopian Airlines and Airbus Sign Flight Hour Services Agreement to Boost Fleet Efficiency
- Survey: 58% of Africans Fear Financial Losses from Cybercrime Amid Rising Digital Threats
- Visa Appoints Michael Berner as Regional Head for Southern and East Africa
- TransUnion and FICO Partner to Enhance Credit Access in Kenya with Advanced Risk Solutions
- Airtel Smarta Bundles Unveiled: Enjoy More Data at Lower Costs
- Airtel Kenya Unveils Airtel Lite: Fast, Lightweight, and Zero Data Charges