{"id":1120903,"date":"2024-01-10T06:52:42","date_gmt":"2024-01-10T11:52:42","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/google-accounts-hacked-without-need-for-passwords-tech-co\/"},"modified":"2024-01-10T06:52:42","modified_gmt":"2024-01-10T11:52:42","slug":"google-accounts-hacked-without-need-for-passwords-tech-co","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/google\/google-accounts-hacked-without-need-for-passwords-tech-co\/","title":{"rendered":"Google Accounts Hacked Without Need for Passwords &#8211; Tech.co"},"content":{"rendered":"<p><p>    The important feature of the zero-day solution is session    persistence, which means a hackers session using a target    Google account will continue to remain valid in the face of a    password change.  <\/p>\n<p>    This means the true owner of the Google account wont be able    to kick them out with a password reset. But further, it also    allows any threat actor exploiting it to generate valid    cookies in the event of a session disruption, which CloudSEK    says enhances the attacker's ability to maintain unauthorized    access.  <\/p>\n<p>    As of January 2024, Google is yet to roll out a comprehensive    solution to the flaw, CloudSEK says.  <\/p>\n<p>    Unfortunately, hackers have already incorporated the exploit    into their info-stealing malware to break into the Google    accounts of unsuspecting victims.  <\/p>\n<p>    After the exploit was made public, in mid-November of 2023, a    threat actor later reverse-engineered this script and    incorporated it into Lumma Infostealer protecting the    methodology with advanced blackboxing techniques CloudSEK    notes.  <\/p>\n<p>    After that, the team behind the Lumma info stealer updated the    exploit to make it even harder for Googles detection systems    to spot.  <\/p>\n<p>    CloudSEK says the exploit has now spread rapidly among    various other threat groups, making the risk to account holders    even higher  Rhadamanthys, Risepro, Meduza, and Stealc Stealer    have reportedly all incorporated the technique already.  <\/p>\n<p>    A simple password reset can't be used to beat this attack    technique alone. CloudSEK recommends that users who believe    their account may have been hacked first log out of all devices    and browsers.  <\/p>\n<p>    Only after following this step can a password reset involving a    sufficiently    complex and unique password be used to invalidate    the threat actor's old tokens.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/tech.co\/news\/google-accounts-hacked-without-passwords\" title=\"Google Accounts Hacked Without Need for Passwords - Tech.co\">Google Accounts Hacked Without Need for Passwords - Tech.co<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The important feature of the zero-day solution is session persistence, which means a hackers session using a target Google account will continue to remain valid in the face of a password change. This means the true owner of the Google account wont be able to kick them out with a password reset. But further, it also allows any threat actor exploiting it to generate valid cookies in the event of a session disruption, which CloudSEK says enhances the attacker's ability to maintain unauthorized access.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/google\/google-accounts-hacked-without-need-for-passwords-tech-co\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[345634],"tags":[],"class_list":["post-1120903","post","type-post","status-publish","format-standard","hentry","category-google"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1120903"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1120903"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1120903\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1120903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1120903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1120903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}