Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
VoidStealer Malware Exploits Chrome Security Flaws

VoidStealer Malware Exploits Chrome Security Flaws

Posted on May 19, 2026 By CWS

A newly identified threat, known as VoidStealer, is causing significant concern among Chrome users on Windows platforms. This sophisticated malware manages to circumvent a crucial security feature in Chrome, posing a risk to stored passwords and session cookies.

Chrome’s App-Bound Encryption at Risk

VoidStealer targets Chrome’s App-Bound Encryption, a protective measure introduced by Google to safeguard user data from unauthorized access. Remarkably, the malware bypasses this security without requiring elevated system permissions, setting it apart from other threats.

Introduced with Chrome version 127 in July 2024, App-Bound Encryption links the browser’s encryption key specifically to Chrome. This was intended to prevent external programs from accessing the key. Initially, this security feature performed well in protecting user data.

Innovative Bypass Methods

Experts at Kaspersky have traced VoidStealer back to March 2026, noting its operation under a Malware-as-a-Service (MaaS) model. This model allows the malware to be rented out, broadening its reach among cybercriminals.

Instead of directly stealing the encryption key, VoidStealer waits for Chrome to decrypt its data during normal operations. It then intercepts the master key when it temporarily becomes readable, avoiding any system alerts.

Once obtained, this key grants access to sensitive data like passwords and session cookies. The misuse of session cookies can lead to unauthorized access to accounts, potentially resulting in financial and identity theft.

Implications for Browser Security

VoidStealer utilizes a debugging technique to infiltrate Chrome, attaching itself to the process as a debugger to monitor internal operations. This allows it to pause Chrome at a critical point where data is decrypted, capturing the key directly from memory.

This method is not limited to Chrome alone; other Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also vulnerable. This extends the threat beyond just Chrome users.

The MaaS business model exacerbates the situation, making it easy for less technically skilled criminals to launch attacks using VoidStealer. This highlights a broader issue in browser security as threat developers outpace the rollout of security patches.

Protective Measures

To safeguard against threats like VoidStealer, users are advised to refrain from storing passwords and payment information directly in browsers. A dedicated password manager offers a more secure alternative.

Additionally, downloading software only from trusted sources, keeping systems and applications updated, and using robust security solutions can help reduce vulnerability to such malware. Awareness and proactive steps remain key to minimizing the risk.

Stay updated on cybersecurity developments by following us on Google News, LinkedIn, and X. Set Cyber Security News as a preferred source for the latest insights.

Cyber Security News Tags:browser vulnerabilities, Chrome security, Cybersecurity, encryption bypass, Kaspersky, MaaS, Malware, password theft, session cookies, VoidStealer

Post navigation

Previous Post: Dark Web Leak: 4.6 Million Credit Cards Exposed
Next Post: OAuth Consent: The New Phishing Threat Bypassing MFA

Related Posts

Checkpoint Details on How Attackers Drained 8M from Balancer Pools Within 30 Minutes Checkpoint Details on How Attackers Drained $128M from Balancer Pools Within 30 Minutes Cyber Security News
Massive Cyberattack Targets Trusted Platforms with Malware Massive Cyberattack Targets Trusted Platforms with Malware Cyber Security News
Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines Interlock Ransomware Employs ClickFix Technique to Run Malicious Commands on Windows Machines Cyber Security News
Chinese Cyber Espionage Targets Singapore Telecom Industry Chinese Cyber Espionage Targets Singapore Telecom Industry Cyber Security News
Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges Cyber Security News
MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild MonetaStealer Malware Powered with AI Code Attacking macOS Users in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cyber Resilience: Key to Modern Business Continuity
  • DirtyDecrypt Exploit PoC for Linux Kernel Vulnerability Released
  • GitHub Action Hack Exposes Developer Credentials
  • Critical ChromaDB Flaw Enables Potential Server Takeover
  • Drupal Urges Immediate Core Security Updates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cyber Resilience: Key to Modern Business Continuity
  • DirtyDecrypt Exploit PoC for Linux Kernel Vulnerability Released
  • GitHub Action Hack Exposes Developer Credentials
  • Critical ChromaDB Flaw Enables Potential Server Takeover
  • Drupal Urges Immediate Core Security Updates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark