Open Nav
Sign Up

Malware Using Google MultiLogin Exploit to Maintain Access Despite Password Reset

Urgent Alert - Google Multilogin Exploit

Bar Refael

January 8, 2024

Google Multilogin Exploit Overview:

  • Threat Type: Malware / Data Theft
    • Nature of Threat: This malware represents a sophisticated form of cyber threat that primarily focuses on unauthorized data access and theft. Its capabilities extend beyond simple data extraction, venturing into persistent and unauthorized access to user accounts and sensitive information.
    • Impact on Data Integrity and Confidentiality: The malware targets the confidentiality and integrity of user data, posing significant risks to personal and organizational data security.
  • Affected Service: Google MultiLogin OAuth endpoint
    • Service Description: The Google MultiLogin feature is an OAuth endpoint used for managing multiple Google accounts. It plays a crucial role in synchronizing user credentials and session tokens across various Google services.
    • Vulnerability Exploited: The malware exploits an undocumented aspect of this service, allowing it to intercept and misuse authentication tokens. This vulnerability is critical because it bypasses standard security measures like password changes.
  • Primary Activity: Hijacking User Sessions, Maintaining Unauthorized Access Post Password Reset
    • Session Hijacking Mechanics: The malware is capable of hijacking active user sessions by exploiting the Google MultiLogin feature. It gains access to session tokens, which are then used to persistently access the user’s Google accounts.
    • Persistence Despite Security Measures: Remarkably, this access remains effective even after users reset their passwords. The conventional security practice of resetting passwords, typically a reliable method for revoking unauthorized access, is rendered ineffective against this type of attack.
    • Implications for Users: This ongoing access poses a serious security threat, as attackers can continuously monitor and extract sensitive information from a user’s Google services without detection.

Additional Considerations

  • Wider Implications: The exploitation of such a feature in a widely-used service like Google’s highlights broader vulnerabilities in popular online services and the need for constant vigilance and updating of security protocols.
  • User Awareness: It is crucial for users to be aware of this type of threat and to understand that traditional security practices, while still necessary, might not always be sufficient against more sophisticated forms of malware.

Google Multilogin Exploit Technical Details:

  • Exploit Discovery: First revealed by PRISMA on October 20, 2023
  • Affected Families: Lumma, Rhadamanthys, Stealc, Meduza, RisePro, WhiteSnake
  • Targeted Data: Tokens and account IDs from Chrome’s token_service table
  • Methodology: Utilizing GAIA ID and encrypted_token to regenerate Google authentication cookies

Threat Actor Profile:

  • Name: PRISMA
  • Discovered Technique: October 20, 2023
  • Recent Increase in Exploit Activity: Recent reports and analyses have indicated a surge in the use of this exploit by various malicious actors, making it a pressing concern. 
  • Method of Communication: Telegram channel
  • Associated Malware Families: Various MaaS stealer families

Impact Assessment:

  • Scope of Impact: Users of Google services via Chrome browser
  • Data at Risk: Session persistence, account accessibility
  • Google’s Response: Acknowledgement of the exploit, securing compromised accounts

Mitigation Strategies:

  • User Actions: Enhanced Safe Browsing in Chrome, monitoring account activity for suspicious sessions
  • Password Management: Advised to change passwords regularly
  • Session Management: Logging out of affected browsers to invalidate stolen sessions

Resources highlights

CVE-2026-42945: Actively Exploited NGINX Rewrite Module Vulnerability Enables Worker Crashes and Possible RCE

CVE-2026-42945 is a heap-based buffer overflow vulnerability affecting NGINX Plus and NGINX Open Source. The flaw exists in the ngx_http_rewrite_module and can be triggered through…

Read more >

CVE-2026-42945

CVE Overload is Here: Why Regular Penetration Testing Matters More Than Ever

On 15 April 2026, NIST made a change that every security leader should pay attention to. The National Vulnerability Database is no longer trying to…

Read more >

CVE overload

CVE-2026-20182: Actively Exploited Cisco Catalyst SD-WAN Vulnerability Enables Admin Access

Cisco has disclosed a critical authentication bypass vulnerability affecting Cisco Catalyst SD-WAN Controller, formerly vSmart, and Cisco Catalyst SD-WAN Manager, formerly vManage. The vulnerability, tracked…

Read more >

cve-2026-20182-cisco-catalyst-sd-wan-admin-access

CVE-2026-44277 & CVE-2026-26083: Critical Fortinet Vulnerabilities Enable Unauthenticated Code Execution

Fortinet has released security updates for two critical vulnerabilities affecting FortiAuthenticator and FortiSandbox. Both vulnerabilities are rated Critical, carry a CVSS score of 9.1, and…

Read more >

cve-2026-44277, cve-2026-26083

CVE-2026-6973: Actively Exploited Ivanti EPMM Vulnerability Enables RCE

Ivanti has released security updates for Ivanti Endpoint Manager Mobile (EPMM) after confirming limited in-the-wild exploitation of CVE-2026-6973, a high-severity remote code execution vulnerability affecting…

Read more >

CVE-2026-6973

CVE-2026-0300: Actively Exploited Palo Alto PAN-OS Vulnerability Enables Root-Level RCE

Palo Alto Networks has disclosed a critical PAN-OS vulnerability, tracked as CVE-2026-0300, affecting the User-ID Authentication Portal, also known as the Captive Portal. The flaw…

Read more >

cve-2026-0300
Under Cyber Attack?

Fill out the form and we will contact you immediately.