Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

Posted on December 4, 2025December 4, 2025 By CWS

A brand new info stealer referred to as Sryxen has emerged within the underground malware market, concentrating on Home windows programs with superior methods to reap browser credentials and delicate knowledge.

Bought as Malware-as-a-Service, this C++ primarily based risk demonstrates how trendy stealers are adapting to beat browser safety enhancements, significantly Google Chrome’s just lately carried out App-Certain Encryption safety.

Sryxen operates as a smash-and-grab credential harvester, designed for fast execution with out establishing persistence on contaminated machines.

The malware targets Chrome model 127 and above, the place Google launched App-Certain Encryption to guard cookies and delicate browser knowledge.

As a substitute of making an attempt to crack this encryption instantly, Sryxen takes an revolutionary method by launching Chrome in headless mode and utilizing the browser’s personal DevTools Protocol to request decrypted cookie knowledge, successfully bypassing the safety measure fully.

Assault Move (Supply – Deceptiq)

DeceptIQ safety researchers recognized that Sryxen employs a number of layers of safety to keep away from detection and evaluation.

The malware makes use of Vectored Exception Dealing with-based code encryption, protecting its fundamental payload encrypted at relaxation and solely decrypting it throughout execution via exception dealing with mechanisms.

This method makes static evaluation difficult, because the malicious code seems as rubbish knowledge when examined with out operating it.

Moreover, the stealer implements six separate anti-debug checks, together with NtGlobalFlag inspection and PEB evaluation, terminating execution if debugging instruments are detected.

Chrome Encryption Bypass Mechanism

Probably the most important innovation in Sryxen is its method to stealing Chrome cookies protected by App-Certain Encryption.

When the malware detects Chrome model 127 or larger, it abandons conventional database extraction strategies. As a substitute, it terminates any operating Chrome processes and relaunches the browser with particular command-line arguments together with –headless, –remote-debugging-port, and –user-data-dir parameters.

The DPAPI Chain (Supply – Deceptiq)

These flags allow distant debugging capabilities with out displaying any seen home windows.

As soon as Chrome launches on this configuration, Sryxen connects to the debugging port by way of WebSocket and sends a DevTools Protocol command requesting all cookies via the Community.getAllCookies methodology.

App-Certain Encryption Bypass (Supply – Deceptiq)

Chrome processes this request internally, decrypting the cookies utilizing its personal App-Certain Encryption key and returning the plaintext knowledge to the stealer. The decrypted cookies by no means contact the disk, making file-based monitoring ineffective.

After receiving the information, Sryxen terminates the Chrome course of and continues harvesting different browser info, passwords, and cryptocurrency pockets knowledge earlier than compressing every part into an archive and importing it to a Telegram bot managed by the attackers utilizing curl instructions executed via PowerShell.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Browser, Bypasses, Chrome, Encryption, Headless, Sryxen, Stealer, Technique

Post navigation

Previous Post: React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
Next Post: Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens

Related Posts

Securing Remote Endpoints in Distributed Enterprise Systems Cyber Security News
Fake Fortinet Sites Steal VPN Credentials in Sophisticated Phishing Attack Cyber Security News
AI-Based Obfuscated Malicious Apps Evading AV Detection to Deploy Malicious Payload Cyber Security News
Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data Cyber Security News
Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability Cyber Security News
Threat Actors Leverage RMM Tools to Deploy Medusa & DragonForce Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark