Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web

93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web

Posted on May 28, 2025May 28, 2025 By CWS

Safety researchers have uncovered a big cybercrime operation involving 93.7 billion stolen browser cookies circulating on darkish net marketplaces, representing a 74% improve from the earlier 12 months’s findings. 

The great evaluation, carried out by NordStellar risk publicity administration platform, reveals that over 15.6 billion of those stolen cookies stay lively, posing fast safety dangers to hundreds of thousands of customers worldwide throughout 253 nations and territories.

The analysis recognized refined information-stealing malware as the first trigger behind this huge knowledge breach. 

Particulars of Huge Cookie Information Breach

Redline Stealer emerged as probably the most prolific risk, accountable for harvesting practically 42 billion cookies, although solely 6.2% remained lively as a result of malware’s broad however much less focused method. 

Vidar, one other malware-as-a-service platform, collected roughly 10.5 billion cookies with 7.2% nonetheless legitimate, whereas the newer LummaC2 stealer accounted for over 8.8 billion stolen cookies with 6.5% remaining lively.

Significantly regarding is CryptBot, which, regardless of gathering only one.4 billion cookies, maintained an distinctive 83.4% lively fee, making it the simplest malware within the dataset. 

These malware instruments function by scanning browser cookie storage utilizing strategies like doc.cookie.cut up(‘;’) to extract session knowledge, then transmitting every little thing to command-and-control servers. The stolen knowledge typically seems on darkish net boards inside minutes of extraction.

The stolen cookies include essential authentication knowledge that bypasses conventional safety measures.

Evaluation revealed 18 billion cookies tagged with “ID” key phrases, 1.2 billion labeled “session,” 272.9 million marked “auth,” and 61.2 million designated “login”.

These cookies allow session hijacking assaults the place criminals can entry person accounts with out passwords or two-factor authentication by reusing legitimate Set-Cookie headers containing session identifiers.

Google providers dominated the dataset with over 4.5 billion compromised cookies linked to Gmail, Google Drive, and different Google platforms, adopted by YouTube and Microsoft, every accounting for over 1 billion cookies. 

The technical sophistication extends past easy knowledge theft, as fashionable infostealers like Rhadamanthys now incorporate AI-powered optical character recognition (OCR) to extract cryptocurrency seed phrases from photographs saved on contaminated units.

International Impression on All Platforms

Home windows units bear the vast majority of assaults, accounting for 85.9% of stolen cookies, whereas over 13.2 billion cookies originated from different working techniques or unknown sources. 

The geographic distribution exhibits Brazil, India, Indonesia, and the USA among the many most affected areas, with European nations like Spain recording 1.75 billion stolen cookies.  The UK, regardless of accounting for less than 800 million cookies, exhibited a regarding 8.3% lively fee.

Safety specialists warn that these lively cookies allow attackers to bypass multi-factor authentication on trusted units, launch focused phishing campaigns utilizing private info, and doubtlessly deploy ransomware by compromised credentials. 

The malware distribution strategies embody disguising as legit software program downloads, using Microsoft Software program Installer (MSI) information for protection evasion, and leveraging pirated software program as an infection vectors.

Organizations and people are urged to implement common cookie clearing practices, make the most of endpoint detection options, and preserve up to date safety consciousness coaching to fight this evolving risk panorama.

Strive in-depth sandbox malware evaluation for your SOC staff. Get ANY.RUN particular supply solely till Could 31 -> Strive Right here

Cyber Security News Tags:Billion, Cookies, Dark, Flooded, Hackers, Stolen, Users, Web

Post navigation

Previous Post: WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack
Next Post: Incident Response Planning – Preparing for Data Breaches

Related Posts

New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control Cyber Security News
Everest Ransomware Group Allegedly Exposes 343 GB of Sensitive Data in Major Under Armour Breach Everest Ransomware Group Allegedly Exposes 343 GB of Sensitive Data in Major Under Armour Breach Cyber Security News
Threat Actors Attacking Job Seekers With Three New Unique Adversaries Threat Actors Attacking Job Seekers With Three New Unique Adversaries Cyber Security News
Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes Cyber Security News
Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation Cyber Security News
New Report Warns of Threat Actors Actively Adopting AI Platforms to Attack Manufacturing Companies New Report Warns of Threat Actors Actively Adopting AI Platforms to Attack Manufacturing Companies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark