Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

Posted on December 4, 2025December 4, 2025 By CWS

A brand new info stealer referred to as Sryxen has emerged within the underground malware market, concentrating on Home windows programs with superior methods to reap browser credentials and delicate knowledge.

Bought as Malware-as-a-Service, this C++ primarily based risk demonstrates how trendy stealers are adapting to beat browser safety enhancements, significantly Google Chrome’s just lately carried out App-Certain Encryption safety.

Sryxen operates as a smash-and-grab credential harvester, designed for fast execution with out establishing persistence on contaminated machines.

The malware targets Chrome model 127 and above, the place Google launched App-Certain Encryption to guard cookies and delicate browser knowledge.

As a substitute of making an attempt to crack this encryption instantly, Sryxen takes an revolutionary method by launching Chrome in headless mode and utilizing the browser’s personal DevTools Protocol to request decrypted cookie knowledge, successfully bypassing the safety measure fully.

Assault Move (Supply – Deceptiq)

DeceptIQ safety researchers recognized that Sryxen employs a number of layers of safety to keep away from detection and evaluation.

The malware makes use of Vectored Exception Dealing with-based code encryption, protecting its fundamental payload encrypted at relaxation and solely decrypting it throughout execution via exception dealing with mechanisms.

This method makes static evaluation difficult, because the malicious code seems as rubbish knowledge when examined with out operating it.

Moreover, the stealer implements six separate anti-debug checks, together with NtGlobalFlag inspection and PEB evaluation, terminating execution if debugging instruments are detected.

Chrome Encryption Bypass Mechanism

Probably the most important innovation in Sryxen is its method to stealing Chrome cookies protected by App-Certain Encryption.

When the malware detects Chrome model 127 or larger, it abandons conventional database extraction strategies. As a substitute, it terminates any operating Chrome processes and relaunches the browser with particular command-line arguments together with –headless, –remote-debugging-port, and –user-data-dir parameters.

The DPAPI Chain (Supply – Deceptiq)

These flags allow distant debugging capabilities with out displaying any seen home windows.

As soon as Chrome launches on this configuration, Sryxen connects to the debugging port by way of WebSocket and sends a DevTools Protocol command requesting all cookies via the Community.getAllCookies methodology.

App-Certain Encryption Bypass (Supply – Deceptiq)

Chrome processes this request internally, decrypting the cookies utilizing its personal App-Certain Encryption key and returning the plaintext knowledge to the stealer. The decrypted cookies by no means contact the disk, making file-based monitoring ineffective.

After receiving the information, Sryxen terminates the Chrome course of and continues harvesting different browser info, passwords, and cryptocurrency pockets knowledge earlier than compressing every part into an archive and importing it to a Telegram bot managed by the attackers utilizing curl instructions executed via PowerShell.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Browser, Bypasses, Chrome, Encryption, Headless, Sryxen, Stealer, Technique

Post navigation

Previous Post: React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
Next Post: Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens

Related Posts

F5 Breached – Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data Cyber Security News
Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Cyber Security News
New Malware Attack Leverages YouTube Channels and Discord to Harvest Credentials from Computer Cyber Security News
Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware Cyber Security News
LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover Cyber Security News
Delta Dental of Virginia Data Breach Exposes 146,000+ Customers Personal Details Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Global Cyber Agencies Issue AI Security Guidance for Critical Infrastructure OT
  • Freedom Mobile Data Breach Exposes Personal Information of Customers
  • Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • Personal Information Compromised in Freedom Mobile Data Breach
  • 5 Threats That Reshaped Web Security This Year [2025]

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Global Cyber Agencies Issue AI Security Guidance for Critical Infrastructure OT
  • Freedom Mobile Data Breach Exposes Personal Information of Customers
  • Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • Personal Information Compromised in Freedom Mobile Data Breach
  • 5 Threats That Reshaped Web Security This Year [2025]

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark