Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web

Posted on May 28, 2025May 28, 2025 By CWS

Safety researchers have uncovered a big cybercrime operation involving 93.7 billion stolen browser cookies circulating on darkish net marketplaces, representing a 74% improve from the earlier 12 months’s findings. 

The great evaluation, carried out by NordStellar risk publicity administration platform, reveals that over 15.6 billion of those stolen cookies stay lively, posing fast safety dangers to hundreds of thousands of customers worldwide throughout 253 nations and territories.

The analysis recognized refined information-stealing malware as the first trigger behind this huge knowledge breach. 

Particulars of Huge Cookie Information Breach

Redline Stealer emerged as probably the most prolific risk, accountable for harvesting practically 42 billion cookies, although solely 6.2% remained lively as a result of malware’s broad however much less focused method. 

Vidar, one other malware-as-a-service platform, collected roughly 10.5 billion cookies with 7.2% nonetheless legitimate, whereas the newer LummaC2 stealer accounted for over 8.8 billion stolen cookies with 6.5% remaining lively.

Significantly regarding is CryptBot, which, regardless of gathering only one.4 billion cookies, maintained an distinctive 83.4% lively fee, making it the simplest malware within the dataset. 

These malware instruments function by scanning browser cookie storage utilizing strategies like doc.cookie.cut up(‘;’) to extract session knowledge, then transmitting every little thing to command-and-control servers. The stolen knowledge typically seems on darkish net boards inside minutes of extraction.

The stolen cookies include essential authentication knowledge that bypasses conventional safety measures.

Evaluation revealed 18 billion cookies tagged with “ID” key phrases, 1.2 billion labeled “session,” 272.9 million marked “auth,” and 61.2 million designated “login”.

These cookies allow session hijacking assaults the place criminals can entry person accounts with out passwords or two-factor authentication by reusing legitimate Set-Cookie headers containing session identifiers.

Google providers dominated the dataset with over 4.5 billion compromised cookies linked to Gmail, Google Drive, and different Google platforms, adopted by YouTube and Microsoft, every accounting for over 1 billion cookies. 

The technical sophistication extends past easy knowledge theft, as fashionable infostealers like Rhadamanthys now incorporate AI-powered optical character recognition (OCR) to extract cryptocurrency seed phrases from photographs saved on contaminated units.

International Impression on All Platforms

Home windows units bear the vast majority of assaults, accounting for 85.9% of stolen cookies, whereas over 13.2 billion cookies originated from different working techniques or unknown sources. 

The geographic distribution exhibits Brazil, India, Indonesia, and the USA among the many most affected areas, with European nations like Spain recording 1.75 billion stolen cookies.  The UK, regardless of accounting for less than 800 million cookies, exhibited a regarding 8.3% lively fee.

Safety specialists warn that these lively cookies allow attackers to bypass multi-factor authentication on trusted units, launch focused phishing campaigns utilizing private info, and doubtlessly deploy ransomware by compromised credentials. 

The malware distribution strategies embody disguising as legit software program downloads, using Microsoft Software program Installer (MSI) information for protection evasion, and leveraging pirated software program as an infection vectors.

Organizations and people are urged to implement common cookie clearing practices, make the most of endpoint detection options, and preserve up to date safety consciousness coaching to fight this evolving risk panorama.

Strive in-depth sandbox malware evaluation for your SOC staff. Get ANY.RUN particular supply solely till Could 31 -> Strive Right here

Cyber Security News Tags:Billion, Cookies, Dark, Flooded, Hackers, Stolen, Users, Web

Post navigation

Previous Post: WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack
Next Post: Incident Response Planning – Preparing for Data Breaches

Related Posts

Cloud Misconfigurations The Silent Threat to Data Security Cyber Security News
Protecting Sensitive Data in Enterprise Systems for Privacy Compliance Cyber Security News
Microsoft Windows 11 Insider Preview Build 26200.5600 Released Cyber Security News
Chrome Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
Network Intrusion Detection for Emerging 2025 Cyber Threats Cyber Security News
Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News