Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

Posted on December 4, 2025December 4, 2025 By CWS

A brand new info stealer referred to as Sryxen has emerged within the underground malware market, concentrating on Home windows programs with superior methods to reap browser credentials and delicate knowledge.

Bought as Malware-as-a-Service, this C++ primarily based risk demonstrates how trendy stealers are adapting to beat browser safety enhancements, significantly Google Chrome’s just lately carried out App-Certain Encryption safety.

Sryxen operates as a smash-and-grab credential harvester, designed for fast execution with out establishing persistence on contaminated machines.

The malware targets Chrome model 127 and above, the place Google launched App-Certain Encryption to guard cookies and delicate browser knowledge.

As a substitute of making an attempt to crack this encryption instantly, Sryxen takes an revolutionary method by launching Chrome in headless mode and utilizing the browser’s personal DevTools Protocol to request decrypted cookie knowledge, successfully bypassing the safety measure fully.

Assault Move (Supply – Deceptiq)

DeceptIQ safety researchers recognized that Sryxen employs a number of layers of safety to keep away from detection and evaluation.

The malware makes use of Vectored Exception Dealing with-based code encryption, protecting its fundamental payload encrypted at relaxation and solely decrypting it throughout execution via exception dealing with mechanisms.

This method makes static evaluation difficult, because the malicious code seems as rubbish knowledge when examined with out operating it.

Moreover, the stealer implements six separate anti-debug checks, together with NtGlobalFlag inspection and PEB evaluation, terminating execution if debugging instruments are detected.

Chrome Encryption Bypass Mechanism

Probably the most important innovation in Sryxen is its method to stealing Chrome cookies protected by App-Certain Encryption.

When the malware detects Chrome model 127 or larger, it abandons conventional database extraction strategies. As a substitute, it terminates any operating Chrome processes and relaunches the browser with particular command-line arguments together with –headless, –remote-debugging-port, and –user-data-dir parameters.

The DPAPI Chain (Supply – Deceptiq)

These flags allow distant debugging capabilities with out displaying any seen home windows.

As soon as Chrome launches on this configuration, Sryxen connects to the debugging port by way of WebSocket and sends a DevTools Protocol command requesting all cookies via the Community.getAllCookies methodology.

App-Certain Encryption Bypass (Supply – Deceptiq)

Chrome processes this request internally, decrypting the cookies utilizing its personal App-Certain Encryption key and returning the plaintext knowledge to the stealer. The decrypted cookies by no means contact the disk, making file-based monitoring ineffective.

After receiving the information, Sryxen terminates the Chrome course of and continues harvesting different browser info, passwords, and cryptocurrency pockets knowledge earlier than compressing every part into an archive and importing it to a Telegram bot managed by the attackers utilizing curl instructions executed via PowerShell.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Browser, Bypasses, Chrome, Encryption, Headless, Sryxen, Stealer, Technique

Post navigation

Previous Post: React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
Next Post: Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens

Related Posts

Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack Cyber Security News
5 Asian Cities Where Cybersecurity Maturity Meets Innovation Cyber Security News
Critical Qualcomm Vulnerabilities Allow Attackers to Execute Arbitrary Code Remotely Cyber Security News
Critical Android 0-Click Vulnerability in System Component Allows RCE Attacks Cyber Security News
Researchers Detailed New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse Cyber Security News
Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Personal Information Compromised in Freedom Mobile Data Breach
  • 5 Threats That Reshaped Web Security This Year [2025]
  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Personal Information Compromised in Freedom Mobile Data Breach
  • 5 Threats That Reshaped Web Security This Year [2025]
  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark