It seems that a new dangerous malware has emerged, allowing hackers to gain access to a user’s Google account. This time, even changing the password doesn’t help. The situation is serious because attackers can hijack expired cookies used for automatic login on websites without the need for a username and password.
FAQ:
- How do cookies work?
- What are the threats associated with malware?
- How to prevent malware attacks?
Cookies are used to store information on websites, such as user preferences or login information. They are saved on the user’s computer and used for identification during subsequent visits to the site.
Malware is malicious software that can carry out various dangerous activities, such as stealing data, damaging systems, or taking over a user’s account.
To prevent malware attacks, it is recommended to regularly update software, use strong passwords, avoid suspicious links, and only download applications from trusted sources.
Solution to this security loophole: Google API and persistent cookies
The attack relies on exploiting a request to Google API, which is used for synchronizing accounts across different services. This creates persistent cookies that allow authentication and access to the account. Even expired cookies can be used by attackers.
Hackers’ reaction and security measures
There are reports that several hacker groups are exploiting this security loophole in Google accounts. Some of these groups claim to have already updated their tools to counteract Google’s update meant to address this issue.
Summary
The situation is serious and caution should be exercised when installing software from unknown sources. The security measures of a user’s Google account may not be sufficient in the face of this new type of attack. It is always important to ensure the currency and security of one’s software and adhere to basic cyber security principles.
Sources:
BleepingComputer
The source of the article is from the blog macnifico.pt