Article Details
Scrape Timestamp (UTC): 2024-04-02 18:09:50.242
Original Article Text
Click to Toggle View
New Chrome feature aims to stop hackers from using stolen cookies. Google announced a new Chrome security feature that ties cookies to a specific device, blocking hackers from stealing and using them to hijack users' accounts. Cookies are files that websites use to remember your browsing information and preferences and automatically log you into a service or website. These cookies are created after you log into a service and verify multi-factor authentications, allowing them to bypass multi-factor authentication (MFA) in future logins. Unfortunately, attackers use malware to steal these cookies, thus circumventing MFA prompts to hijack the linked accounts. To solve this problem, Google is working on a new feature called Device Bound Session Credentials (DBSC) that makes it impossible for attackers to steal your cookies by cryptographically binding your authentication cookies to your device. After enabling DBSC, the authentication process is linked to a specific new public/private key pair generated using your device's Trusted Platform Module (TPM) chip that can't be exfiltrated and is securely stored on your device, so even if an attacker steals your cookies, they won't be able to access your accounts. "By binding authentication sessions to the device, DBSC aims to disrupt the cookie theft industry since exfiltrating these cookies will no longer have any value," said Kristian Monsen, a software engineer on Google's Chrome Counter Abuse team. "We think this will substantially reduce the success rate of cookie theft malware. Attackers would be forced to act locally on the device, which makes on-device detection and cleanup more effective, both for anti-virus software as well as for enterprise managed devices." While still in the prototype phase, according to this estimated timeline shared by Google, you can test DBSC by going to chrome://flags/ and enabling the "enable-bound-session-credentials" dedicated flag on Windows, Linux, and macOS Chromium-based web browsers. DBSC works by allowing a server to start a new session with your browser and associate it with a public key stored on your device using a dedicated API (Application Programming Interface). Each session is backed by a unique key to protect your privacy, with the server only receiving the public key used to verify possession later. DBSC doesn't enable sites to track you across different sessions on the same device, and you can delete the keys it creates at any time. This new security capability is expected to be initially supported by about half of all Chrome desktop devices, and it will be fully aligned with the phase-out of third-party cookies in Chrome. "When it's deployed fully, consumers and enterprise users will get upgraded security for their Google accounts under the hood automatically," Monsen added. "We are also working to enable this technology for our Google Workspace and Google Cloud customers to provide another layer of account security." In recent months, threat actors have been abusing the undocumented Google OAuth "MultiLogin" API endpoint to generate new authentication cookies after previously stolen ones have expired. Previously, BleepingComputer reported that the Lumma and Rhadamanthys information-stealing malware operations claimed they could restore expired Google authentication cookies stolen in attacks. At the time, Google advised users to remove any malware from their devices and recommended enabling Enhanced Safe Browsing in Chrome to defend against phishing and malware attacks. However, this new feature will effectively block the threat actors from abusing these stolen cookies, as they will not have access to the cryptographic keys required to use them.
Daily Brief Summary
Google announced a new Chrome feature, Device Bound Session Credentials (DBSC), designed to prevent cookie theft by tying cookies to specific devices.
DBSC utilizes public/private key pairs and the device's Trusted Platform Module (TPM) chip to secure authentication cookies, making them useless if stolen.
The feature aims to render the cookie theft industry ineffective by eliminating the value of exfiltrated cookies, forcing attackers to deal with device-level security.
Currently in the prototype phase, users can test DBSC on Chromium-based browsers by enabling a dedicated flag on Windows, Linux, and macOS.
The server-client session is initiated using a dedicated API, with each session having a unique key to ensure privacy, and users can delete the keys at any time.
Google expects this feature to improve security for Google accounts, Workspace, and Cloud customers automatically upon full deployment.
The initiative responds to recent abuse of Google's OAuth "MultiLogin" API by threat actors and contributes to Google's broader efforts to enhance Chrome's defense against phishing and malware.