Blog Posts

Blog Posts

New Cybersecurity Risk Circumvents Two-Factor Authentication to Capture Accounts and Passwords

Varonis has identified an infostealer that gathers browser credentials, which include accounts and passwords, session cookies, and cryptocurrency wallets. An infostealer is a category of malware created to collect sensitive information and transmit it to a remote attacker. Once that data is decrypted, the attacker can make use of it. Information stealers have existed since the mid-2000s, but this recent variant, dubbed Storm, utilizes a distinctive approach that permits attackers to obtain Google account tokens, two-factor authentication codes, and more.

Traditional information-stealing malware is among the prevalent methods for password theft and primarily operates locally, on an infected user’s machine. It loads compromised SQLite libraries, an embedded database engine that aids application performance, and subsequently accesses stored account data that way. It is widespread and easily identified by endpoint security solutions. Google shifted this paradigm when it introduced what is known as App-Bound Encryption in Chrome 127 in July 2024. As Varonis clarifies, encryption keys became linked to the Chrome browser, which effectively “complicated local decryption even further.”

Consequently, malware evolved to be more sophisticated, but the “first wave” of enhancements inserted harmful code into Chrome or exploited its debugging protocols. This approach still left detectable evidence for security solutions. Enter Storm. Now, locally gathered data — still encrypted — is transmitted to a proprietary framework. After a machine is compromised, attackers harvest the data needed to restore hijacked sessions from a distance. Collected items include saved passwords, session cookies, autofill form data, Google account tokens, credit card information, browsing histories, and even files from user directories and popular applications. Additionally, since data is decrypted server-side, Storm remains undetectable by numerous endpoint security solutions.

What additional capabilities does Storm possess that enhance its sophistication?

EU Directs Google to Share Search Data with Competitors

The European Commission today sent Google its preliminary findings under the Digital Markets Act, proposing six specific measures governing how Google must share search ranking, query, click, and view data with competing search engines. AI chatbots with search functionalities are explicitly included as potential data beneficiaries. A public consultation opens tomorrow. The European Commission has […]

This story continues at The Next Web

Amazon Unveils AI Bio Platform to Speed Up Early-Stage Drug Discovery

Amazon Web Services (AWS)  announced this Tuesday the launch of its AI bio tool, Amazon Bio Discovery, to accelerate the early-stage process of drug discovery in the pharmaceutical industry. The application aims to help scientists design and test novel drugs in a fast and secure way. Amazon Bio Discovery enables scientists to run complex computational […]

This story continues at The Next Web

Exclusive: Make Launches Mentorship Office at STATION F

The Celonis-owned visual automation platform, which already has more than 200 STATION F startups on its programme, is putting a permanent on-campus presence in Paris as it targets France as a strategic growth market. One-on-onementorship, workshops, and hackathon participation are all part of the offer. Make, the visual automation and AI agents platform owned by […]

This story continues at The Next Web

UK Banks to Receive Mythos Briefing Within Days

The Bank of England’s Cross Market Operational Resilience Group will convene within days to brief major UK banks, insurers, and exchanges about Anthropic’s Claude Mythos Preview. This unreleased AI model regulators say can autonomously identify and exploit vulnerabilities across every major operating system and web browser. The US Treasury, the Federal Reserve, and the Bank […]

This story continues at The Next Web