VoidStealer uses debugger trick to steal Chrome’s encryption key

March 23, 20262 min read2 sources
Share:
VoidStealer uses debugger trick to steal Chrome’s encryption key

A newly reported information stealer called VoidStealer can bypass Google Chrome’s Application-Bound Encryption (ABE) on Windows by using a debugger-based technique to extract the browser’s master key, according to BleepingComputer. With that key, the malware can decrypt sensitive browser data including cookies, saved credentials, and session tokens that ABE was designed to better protect.

The technique matters because Chrome rolled out ABE in 2024 to make stolen browser databases less useful outside the original app and device context. VoidStealer does not appear to break Chrome’s encryption directly. Instead, it targets the point where the key is available during normal browser operation, showing how infostealers are shifting from offline file theft to runtime abuse of live processes.

That shift has practical consequences for both consumers and enterprises. Stolen cookies and session tokens can let attackers hijack accounts without needing a password reset workflow, and in some cases can sidestep MFA if a session is already authenticated. For business users, that raises the risk of unauthorized access to email, cloud dashboards, internal portals, and remote access services, including VPN sessions tied to browser-based authentication.

No CVE has been tied to the activity in current public reporting, and the story is better understood as a malware capability update than a single software flaw. The broader lesson is that endpoint compromise can still defeat protections meant to secure data at rest. If malware can run under the same user context, it may be able to wait until protected material is legitimately decrypted and then steal it from memory.

Defenders should treat browser secret theft as a full account-compromise risk. Recommended steps include revoking active sessions, rotating exposed credentials, enforcing phishing-resistant MFA where possible, reducing local admin rights, and monitoring for suspicious access to browser processes or debugging behavior. Browser hardening still raises attacker costs, but VoidStealer shows those costs are not high enough to stop adaptation.

Share:

// SOURCES

// RELATED

Trivy hack spreads infostealer via Docker, triggers worm and Kubernetes wiper

A hypothetical supply chain attack on the Trivy security scanner via Docker Hub highlights a severe threat involving an infostealer, worm, and a Kuber

6 min readApr 1

We found eight attack vectors inside AWS Bedrock. Here's what attackers can do with them

Security researchers have uncovered eight critical attack vectors in AWS Bedrock, Amazon's AI platform, revealing how its deep enterprise integration

7 min readApr 1

Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now

F5 reclassified a BIG-IP flaw as a critical RCE vulnerability, CVE-2023-46747, now actively exploited to deploy webshells. Immediate patching is vital

5 min readApr 1

The AI arms race: why unified exposure management is becoming a boardroom priority

The weaponization of AI is accelerating the speed and sophistication of cyberattacks. This analysis explores why a proactive Unified Exposure Manageme

6 min readApr 1