Connect with us

Security

Enhanced Security Measures: Google Chrome’s Infostealer Protection for Session Cookie Theft

Published

on

Google Chrome Enhances Security Against Info-Stealing Malware

Google has recently introduced Device Bound Session Credentials (DBSC) protection in Chrome version 146 for Windows. This update aims to prevent info-stealing malware from collecting session cookies, thereby enhancing user security.

While Windows users can already benefit from this new security feature, macOS users can expect it in a future Chrome release, although the specific date has not been announced yet.

The announcement of this new protection was made in 2024, and it operates by linking a user’s session to their hardware, such as the Trusted Platform Module (TPM) on Windows and the Secure Enclave on macOS.

By generating unique public/private keys for encrypting sensitive data through the security chip, Chrome ensures that these keys cannot be exported from the device. This approach effectively prevents attackers from using stolen session data.

According to Google, the issuance of new session cookies is dependent on Chrome proving possession of the corresponding private key to the server. Without this key, any stolen session cookie becomes unusable almost immediately.

The Device Bound Session Credentials (DBSC) flow
Browser-server interaction in the context of the DBSC protocol
source: Google

A session cookie functions as an authentication token created server-side based on user credentials. Threat actors often use specialized malware known as infostealer to collect these session cookies and gain unauthorized access to user accounts.

The DBSC protocol is designed to be private, with each session backed by a unique key. This prevents websites from tracking user activity across different sessions on the same device.

In collaboration with web platforms like Okta, Google observed a decrease in session theft events during a year of testing the early version of DBSC. The protocol, developed in partnership with Microsoft, is aimed to become an open web standard.

See also  Enhanced iOS Experience: Introducing Lock and Home Screen Widgets for Slack

Websites can adopt more secure, hardware-bound sessions by implementing dedicated registration and refresh endpoints to their backend systems without compromising compatibility with existing frontends.

For web developers interested in implementing DBSC, Google provides a comprehensive guide with specifications available on the World Wide Web Consortium (W3C) website and an explainer on GitHub.

tines

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

Trending