Open Nav
Sign Up

Malware Using Google MultiLogin Exploit to Maintain Access Despite Password Reset

Urgent Alert - Google Multilogin Exploit

Bar Refael

January 8, 2024

Google Multilogin Exploit Overview:

  • Threat Type: Malware / Data Theft
    • Nature of Threat: This malware represents a sophisticated form of cyber threat that primarily focuses on unauthorized data access and theft. Its capabilities extend beyond simple data extraction, venturing into persistent and unauthorized access to user accounts and sensitive information.
    • Impact on Data Integrity and Confidentiality: The malware targets the confidentiality and integrity of user data, posing significant risks to personal and organizational data security.
  • Affected Service: Google MultiLogin OAuth endpoint
    • Service Description: The Google MultiLogin feature is an OAuth endpoint used for managing multiple Google accounts. It plays a crucial role in synchronizing user credentials and session tokens across various Google services.
    • Vulnerability Exploited: The malware exploits an undocumented aspect of this service, allowing it to intercept and misuse authentication tokens. This vulnerability is critical because it bypasses standard security measures like password changes.
  • Primary Activity: Hijacking User Sessions, Maintaining Unauthorized Access Post Password Reset
    • Session Hijacking Mechanics: The malware is capable of hijacking active user sessions by exploiting the Google MultiLogin feature. It gains access to session tokens, which are then used to persistently access the user’s Google accounts.
    • Persistence Despite Security Measures: Remarkably, this access remains effective even after users reset their passwords. The conventional security practice of resetting passwords, typically a reliable method for revoking unauthorized access, is rendered ineffective against this type of attack.
    • Implications for Users: This ongoing access poses a serious security threat, as attackers can continuously monitor and extract sensitive information from a user’s Google services without detection.

Additional Considerations

  • Wider Implications: The exploitation of such a feature in a widely-used service like Google’s highlights broader vulnerabilities in popular online services and the need for constant vigilance and updating of security protocols.
  • User Awareness: It is crucial for users to be aware of this type of threat and to understand that traditional security practices, while still necessary, might not always be sufficient against more sophisticated forms of malware.

Google Multilogin Exploit Technical Details:

  • Exploit Discovery: First revealed by PRISMA on October 20, 2023
  • Affected Families: Lumma, Rhadamanthys, Stealc, Meduza, RisePro, WhiteSnake
  • Targeted Data: Tokens and account IDs from Chrome’s token_service table
  • Methodology: Utilizing GAIA ID and encrypted_token to regenerate Google authentication cookies

Threat Actor Profile:

  • Name: PRISMA
  • Discovered Technique: October 20, 2023
  • Recent Increase in Exploit Activity: Recent reports and analyses have indicated a surge in the use of this exploit by various malicious actors, making it a pressing concern. 
  • Method of Communication: Telegram channel
  • Associated Malware Families: Various MaaS stealer families

Impact Assessment:

  • Scope of Impact: Users of Google services via Chrome browser
  • Data at Risk: Session persistence, account accessibility
  • Google’s Response: Acknowledgement of the exploit, securing compromised accounts

Mitigation Strategies:

  • User Actions: Enhanced Safe Browsing in Chrome, monitoring account activity for suspicious sessions
  • Password Management: Advised to change passwords regularly
  • Session Management: Logging out of affected browsers to invalidate stolen sessions

Resources highlights

New Linux Vulnerabilities (CVE-2025-6018 & CVE-2025-6019) Enable Full Root Access in Seconds

Security researchers have uncovered a critical privilege escalation chain in major Linux distributions that allows any local user with a session (SSH or GUI) to…

Read more >

CVE-2025-6018, CVE-2025-6019

Zero to Hero: How Our Red Team Turned a Sticky Note Into Full Cloud Compromise

“The weakest link in your security chain might be sitting right on your desk.” At OP Innovate, our CREST-certified red team is trained to think…

Read more >

OP Innovate Red Team

One-Third of All Grafana Instances Vulnerable to XSS (CVE-2025-4123)

Over 46,000 internet-facing Grafana servers (≈36 % of those online) are still running versions susceptible to CVE-2025-4123, a high-severity open-redirect that chains into stored cross-site…

Read more >

CVE-2025-4123

New Microsoft Outlook Vulnerability Enables Local Code Execution (CVE-2025-47176)

Published: June 11, 2025 Threat Level: High Affected Product: Microsoft Outlook (Microsoft 365 Apps for Enterprise, Office LTSC 2024) CVSS Score: 7.8 (High) A newly…

Read more >

CVE-2025-47176

How MSSPs Are Turning Penetration Testing Into Recurring Revenue with WASP

When OP Innovate first launched WASP in 2022, we weren’t chasing unicorn status or massive VC rounds. We were focused on fixing a real problem:…

Read more >

CVE-2025-49113: Actively Exploited Critical Vulnerability in Roundcube Webmail

Severity: Critical (CVSS 9.9) Status: Active Exploitation Confirmed On June 1, 2025, Roundcube developers issued critical security updates to patch a newly discovered vulnerability in…

Read more >

CVE-2025-49113.
Under Cyber Attack?

Fill out the form and we will contact you immediately.