Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

Posted on December 4, 2025December 4, 2025 By CWS

A brand new info stealer referred to as Sryxen has emerged within the underground malware market, concentrating on Home windows programs with superior methods to reap browser credentials and delicate knowledge.

Bought as Malware-as-a-Service, this C++ primarily based risk demonstrates how trendy stealers are adapting to beat browser safety enhancements, significantly Google Chrome’s just lately carried out App-Certain Encryption safety.

Sryxen operates as a smash-and-grab credential harvester, designed for fast execution with out establishing persistence on contaminated machines.

The malware targets Chrome model 127 and above, the place Google launched App-Certain Encryption to guard cookies and delicate browser knowledge.

As a substitute of making an attempt to crack this encryption instantly, Sryxen takes an revolutionary method by launching Chrome in headless mode and utilizing the browser’s personal DevTools Protocol to request decrypted cookie knowledge, successfully bypassing the safety measure fully.

Assault Move (Supply – Deceptiq)

DeceptIQ safety researchers recognized that Sryxen employs a number of layers of safety to keep away from detection and evaluation.

The malware makes use of Vectored Exception Dealing with-based code encryption, protecting its fundamental payload encrypted at relaxation and solely decrypting it throughout execution via exception dealing with mechanisms.

This method makes static evaluation difficult, because the malicious code seems as rubbish knowledge when examined with out operating it.

Moreover, the stealer implements six separate anti-debug checks, together with NtGlobalFlag inspection and PEB evaluation, terminating execution if debugging instruments are detected.

Chrome Encryption Bypass Mechanism

Probably the most important innovation in Sryxen is its method to stealing Chrome cookies protected by App-Certain Encryption.

When the malware detects Chrome model 127 or larger, it abandons conventional database extraction strategies. As a substitute, it terminates any operating Chrome processes and relaunches the browser with particular command-line arguments together with –headless, –remote-debugging-port, and –user-data-dir parameters.

The DPAPI Chain (Supply – Deceptiq)

These flags allow distant debugging capabilities with out displaying any seen home windows.

As soon as Chrome launches on this configuration, Sryxen connects to the debugging port by way of WebSocket and sends a DevTools Protocol command requesting all cookies via the Community.getAllCookies methodology.

App-Certain Encryption Bypass (Supply – Deceptiq)

Chrome processes this request internally, decrypting the cookies utilizing its personal App-Certain Encryption key and returning the plaintext knowledge to the stealer. The decrypted cookies by no means contact the disk, making file-based monitoring ineffective.

After receiving the information, Sryxen terminates the Chrome course of and continues harvesting different browser info, passwords, and cryptocurrency pockets knowledge earlier than compressing every part into an archive and importing it to a Telegram bot managed by the attackers utilizing curl instructions executed via PowerShell.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Browser, Bypasses, Chrome, Encryption, Headless, Sryxen, Stealer, Technique

Post navigation

Previous Post: React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
Next Post: Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens

Related Posts

Critical Chrome Zero-Day Vulnerability PoC Released Critical Chrome Zero-Day Vulnerability PoC Released Cyber Security News
Urgent Chrome Update Fixes Critical Security Issues Urgent Chrome Update Fixes Critical Security Issues Cyber Security News
Adversarial Machine Learning – Securing AI Models Adversarial Machine Learning – Securing AI Models Cyber Security News
Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data Cyber Security News
Christmas Phishing Surge Chains Docusign Spoofing with Identity Theft Questionnaires Christmas Phishing Surge Chains Docusign Spoofing with Identity Theft Questionnaires Cyber Security News
Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark