Open Nav
Sign Up

Malware Using Google MultiLogin Exploit to Maintain Access Despite Password Reset

Urgent Alert - Google Multilogin Exploit

Bar Refael

January 8, 2024

Google Multilogin Exploit Overview:

  • Threat Type: Malware / Data Theft
    • Nature of Threat: This malware represents a sophisticated form of cyber threat that primarily focuses on unauthorized data access and theft. Its capabilities extend beyond simple data extraction, venturing into persistent and unauthorized access to user accounts and sensitive information.
    • Impact on Data Integrity and Confidentiality: The malware targets the confidentiality and integrity of user data, posing significant risks to personal and organizational data security.
  • Affected Service: Google MultiLogin OAuth endpoint
    • Service Description: The Google MultiLogin feature is an OAuth endpoint used for managing multiple Google accounts. It plays a crucial role in synchronizing user credentials and session tokens across various Google services.
    • Vulnerability Exploited: The malware exploits an undocumented aspect of this service, allowing it to intercept and misuse authentication tokens. This vulnerability is critical because it bypasses standard security measures like password changes.
  • Primary Activity: Hijacking User Sessions, Maintaining Unauthorized Access Post Password Reset
    • Session Hijacking Mechanics: The malware is capable of hijacking active user sessions by exploiting the Google MultiLogin feature. It gains access to session tokens, which are then used to persistently access the user’s Google accounts.
    • Persistence Despite Security Measures: Remarkably, this access remains effective even after users reset their passwords. The conventional security practice of resetting passwords, typically a reliable method for revoking unauthorized access, is rendered ineffective against this type of attack.
    • Implications for Users: This ongoing access poses a serious security threat, as attackers can continuously monitor and extract sensitive information from a user’s Google services without detection.

Additional Considerations

  • Wider Implications: The exploitation of such a feature in a widely-used service like Google’s highlights broader vulnerabilities in popular online services and the need for constant vigilance and updating of security protocols.
  • User Awareness: It is crucial for users to be aware of this type of threat and to understand that traditional security practices, while still necessary, might not always be sufficient against more sophisticated forms of malware.

Google Multilogin Exploit Technical Details:

  • Exploit Discovery: First revealed by PRISMA on October 20, 2023
  • Affected Families: Lumma, Rhadamanthys, Stealc, Meduza, RisePro, WhiteSnake
  • Targeted Data: Tokens and account IDs from Chrome’s token_service table
  • Methodology: Utilizing GAIA ID and encrypted_token to regenerate Google authentication cookies

Threat Actor Profile:

  • Name: PRISMA
  • Discovered Technique: October 20, 2023
  • Recent Increase in Exploit Activity: Recent reports and analyses have indicated a surge in the use of this exploit by various malicious actors, making it a pressing concern. 
  • Method of Communication: Telegram channel
  • Associated Malware Families: Various MaaS stealer families

Impact Assessment:

  • Scope of Impact: Users of Google services via Chrome browser
  • Data at Risk: Session persistence, account accessibility
  • Google’s Response: Acknowledgement of the exploit, securing compromised accounts

Mitigation Strategies:

  • User Actions: Enhanced Safe Browsing in Chrome, monitoring account activity for suspicious sessions
  • Password Management: Advised to change passwords regularly
  • Session Management: Logging out of affected browsers to invalidate stolen sessions

Resources highlights

Critical Zero-Day in Microsoft SharePoint Actively Exploited (CVE-2025-53770)

A newly discovered zero-day vulnerability in Microsoft SharePoint Server, tracked as CVE-2025-53770, is currently being exploited in active attacks against on-premises environments. The flaw, rated…

Read more >

CVE-2025-53770

Over 600 Laravel Applications Vulnerable to Remote Code Execution via Leaked APP_KEYs (CVE-2018-15133, CVE-2024-55556)

Security researchers have uncovered a major RCE threat affecting over 600 Laravel applications, triggered by leaked APP_KEYs found on public GitHub repositories. Laravel's APP_KEY, typically…

Read more >

CVE-2018-15133, CVE-2024-55556

CVE-2025-3648: “Count(er) Strike” Vulnerability in ServiceNow

CVE-2025-3648, dubbed “Count(er) Strike”, is a high-severity vulnerability (CVSS 8.2) in ServiceNow's Now Platform, discovered by Varonis Threat Labs. The flaw allows both authenticated and…

Read more >

CVE-2025-3648

What to Look for in a Pentesting Platform (Beyond Just Scans)

Penetration testing platforms are a great way to centralize vulnerability discovery and triage. However, when evaluating penetration testing platforms, many organizations make the mistake of…

Read more >

pentesting platform

CVE-2016-10033: Actively Exploited Remote Code Execution (RCE) Vulnerability in PHPMailer

CVE-2016-10033 is a critical remote code execution vulnerability in PHPMailer, a widely used PHP library for sending emails. The flaw lies in the mailSend function…

Read more >

CVE-2016-10033

High-Severity WordPress Vulnerability in Forminator Plugin (CVE-2025-6463)

A critical vulnerability in the Forminator plugin, one of the most popular form-building plugins in Wordpress, allows unauthenticated attackers to delete arbitrary files on the…

Read more >

CVE-2025-6463
Under Cyber Attack?

Fill out the form and we will contact you immediately.