April 29, 2024

Valley Post

Read Latest News on Sports, Business, Entertainment, Blogs and Opinions from leading columnists.

Hackers have discovered a major security vulnerability for Google accounts even after changing passwords

Hackers have discovered a major security vulnerability for Google accounts even after changing passwords

A worrying discovery has been brought to the attention of a group of cybersecurity experts, who note that an advanced form of malware is spreading across the Internet and compromising Google accounts without requiring a user's password! This vulnerability, discovered by CloudSEK, a leading security company, exploits cookies to illegally access a user's private data. This malware is currently being actively used by hackers and clearly poses a major threat to Internet security, because by gaining access to a user's email, many other accounts can then be compromised.

The vulnerability was first discovered in October 2023, when details about the exploit appeared on a Telegram channel by a hacker. The attack method involves manipulating Google's authentication cookies, which are designed to theoretically make users' lives easier by eliminating the need to log in with their password every time. However, these cookies have evolved into a vulnerability, allowing hackers to bypass even two-factor authentication mechanisms. In fact, if a hacker gets hold of the desired cookies, they can access the account even if the user changes their password!

It's so serious that Google hasn't left it unaddressed. In a statement, the company stressed its continued commitment to strengthening defenses against such cyber attacks and protecting users exposed to malware. Google is currently advising users to enable Chrome's Enhanced Safe Browsing feature to provide additional protection against phishing and malware. At the same time, the company is making a broader effort to completely eliminate third-party cookies. More about this project you can learn By clicking here.

Finally, to learn more about the important vulnerability, you can read CloudSEK researcher Pavan Karthick M.'s post titled “Malware Exploits Undocumented OAuth2 Functionality to Hijack Session,” By clicking here.

See also  Blowers repel killer whales with diarrhea bombs