The silent “Storm”: New infostealer hijacks sessions, decrypts server-side
Overview
A new infostealer called 'Storm' has emerged, capable of hijacking user sessions by decrypting data on the server side rather than locally. This technique allows attackers to bypass traditional security measures like passwords and multi-factor authentication (MFA). Researchers from Varonis have demonstrated how the infostealer sends sensitive browser data directly to the attackers' servers, raising significant concerns about user privacy and account security. The implications are serious, as organizations relying on standard security protocols may find themselves vulnerable to these sophisticated attacks. Companies should be vigilant and assess their security measures to protect against this evolving threat.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: Web browsers and online accounts that rely on session management and MFA.
- Action Required: Implement enhanced security measures such as stronger session management, continuous monitoring of user sessions, and consider additional layers of authentication beyond MFA.
- Timeline: Newly disclosed
Original Article Summary
New "Storm" infostealer skips local decryption, sending browser data to attacker servers. Varonis shows how server-side decryption enables session hijacking, bypassing passwords and MFA. [...]
Impact
Web browsers and online accounts that rely on session management and MFA.
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Implement enhanced security measures such as stronger session management, continuous monitoring of user sessions, and consider additional layers of authentication beyond MFA.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Data Breach, Malware.