Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
VoidStealer Variant Evades Chrome Security Without Injection

VoidStealer Variant Evades Chrome Security Without Injection

Posted on March 20, 2026 By CWS

A recent development in the cybersecurity landscape has seen a new variant of the VoidStealer infostealer bypass Google Chrome’s Application-Bound Encryption (ABE) without employing code injection or high-level system privileges. This marks a significant evolution in malware capabilities and has captured the attention of security experts worldwide.

Introduction of VoidStealer Variant

Introduced as part of VoidStealer version 2.0 on March 13, 2026, this new variant utilizes a debugger-based method to extract encrypted browser credentials directly from memory. This innovative approach represents a major shift in credential theft techniques, challenging existing security measures.

Google’s ABE, implemented with Chrome 127 in July 2024, was designed to significantly impede malware access to sensitive browser data, such as stored passwords and cookies. It achieves this by linking the encryption key, known as the v20_master_key, to a system-level service operating with high privileges on Windows systems.

Evolution and Detection Challenges

Despite the enhanced security provided by ABE, cybercriminals have continuously developed methods to circumvent it. GenDigital analysts have identified VoidStealer as a Malware-as-a-Service (MaaS) offering, which first emerged on dark web forums in December 2025, including HackForums.

VoidStealer’s rapid evolution is notable, with a swift progression from version 1.0 to 2.1 in a mere three months. The transition from traditional injection-based methods to a debugger-based approach, as seen in version 2.0, sets VoidStealer apart as the first in the wild to employ this technique.

Technical Details of the Bypass

The primary threat of this variant lies in its minimal detection footprint. Unlike other ABE bypass techniques that require elevated privileges or direct browser code injection, VoidStealer leverages standard Windows debugging APIs, which are less likely to trigger security alerts.

VoidStealer targets both Google Chrome and Microsoft Edge. The method, inspired by the open-source ElevationKatz project, involves using a debugger to set hardware breakpoints when the v20_master_key appears in memory as plaintext. This process is initiated by creating a suspended browser process and attaching a debugger, which then monitors for specific debug events.

Once key browser DLLs load, VoidStealer scans them to locate relevant sections where the encryption key becomes accessible. By setting hardware breakpoints across all threads, it extracts the key using minimal memory operations, thereby evading detection.

Implications and Defensive Measures

The availability of this technique through ElevationKatz suggests a potential increase in similar bypass attempts by other infostealers. As a countermeasure, security teams should consider any process that attaches a debugger to a browser as suspicious and monitor for unusual memory access patterns.

To enhance detection capabilities, organizations should flag processes that initiate browsers using hidden or headless modes, and alert on unexpected debugger attachments. The known indicator of compromise for VoidStealer v2.0 is identified as: f783fde5cf7930e4b3054393efadd3675b505cbef8e9d7ae58aa35b435adeea4.

For further updates, follow us on Google News, LinkedIn, and X, and set CSN as a preferred source on Google.

Cyber Security News Tags:ABE bypass, browser credentials, Chrome security, Cybersecurity, debugger technique, ElevationKatz, InfoStealer, MaaS, Malware, VoidStealer

Post navigation

Previous Post: Eclypsium Secures $25M for Enhanced Supply Chain Security
Next Post: Three Charged in AI Technology Smuggling to China

Related Posts

WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System Cyber Security News
Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files Cyber Security News
Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers Cyber Security News
Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online Cyber Security News
Hackers Exploit Screensavers for Remote Access Hackers Exploit Screensavers for Remote Access Cyber Security News
New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • XBOW Secures $35 Million to Boost Autonomous Security
  • AI Agents Outpacing Governance: A Growing Challenge
  • Salesforce Fixes Major Marketing Cloud Security Flaws
  • Iranian Cyber Threat Poses as Ransomware Attack
  • MuddyWater Exploits Teams for Credential Theft in Covert Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • XBOW Secures $35 Million to Boost Autonomous Security
  • AI Agents Outpacing Governance: A Growing Challenge
  • Salesforce Fixes Major Marketing Cloud Security Flaws
  • Iranian Cyber Threat Poses as Ransomware Attack
  • MuddyWater Exploits Teams for Credential Theft in Covert Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark