Connect with us

Security

Unveiling the Dark Secrets of VoidStealer: How the Malware Steals Chrome Master Key with a Clever Debugger Trick

Published

on

The Rise of VoidStealer: A New Breed of Information Stealer

In the realm of cybersecurity, a new threat has emerged known as VoidStealer. This sophisticated malware utilizes a groundbreaking technique to circumvent Chrome’s Application-Bound Encryption (ABE) and extract the elusive master key essential for decrypting sensitive browser data. The method employed by VoidStealer is not only ingenious but also exceptionally stealthy, utilizing hardware breakpoints to directly access the v20_master_key from the browser’s memory without the need for privilege escalation or code injection.

VoidStealer’s innovative approach has garnered attention from security experts, with Gen Digital, the parent company of renowned antivirus brands like Norton and Avast, highlighting it as the first instance of an infostealer utilizing such a mechanism in the wild.

The Evolution of Chrome’s Application-Bound Encryption

Google introduced ABE in Chrome 127, a significant update released in June 2024. This new security feature was designed to safeguard sensitive browser data, including cookies, by encrypting the master key on disk, rendering it inaccessible through conventional user-level access. However, despite Google’s efforts to fortify the system, multiple malware families have successfully bypassed ABE, demonstrating its vulnerabilities.

One such malware, VoidStealer, has made headlines for its unique debugger-based ABE bypass technique. By leveraging hardware breakpoints, VoidStealer can intercept the v20_master_key directly from the browser’s memory, posing a significant threat to Chrome users worldwide.

The Anatomy of VoidStealer’s Master Key Extraction

VoidStealer’s modus operandi involves a precise sequence of actions to extract the coveted master key. By targeting a fleeting moment when the v20_master_key is temporarily present in plaintext form during decryption operations, VoidStealer initiates a hidden browser process, suspends it, and attaches a debugger to monitor the loading of the target browser DLL (chrome.dll or msedge.dll).

See also  Corporate Espionage: The Dark Side of Zoom Stealer Browser Extensions

Once the DLL is loaded, VoidStealer scans for a specific string and the associated LEA instruction, setting a hardware breakpoint at the instruction’s address. This breakpoint is then applied to all existing and newly created browser threads, awaiting activation during the browser’s startup phase. When triggered, the breakpoint allows VoidStealer to extract the plaintext v20_master_key from the browser’s memory using the ‘ReadProcessMemory’ function.

Gen Digital emphasizes that the optimal time for VoidStealer to execute this operation is during the browser’s startup, as this is when ABE-protected cookies are decrypted, necessitating access to the master key.

The Genesis of VoidStealer’s Technique

While VoidStealer’s method may seem groundbreaking, it is not entirely novel. The malware is believed to have drawn inspiration from the open-source project ‘ElevationKatz,’ a component of the ChromeKatz toolset that exposes vulnerabilities in Chrome’s security mechanisms. Although VoidStealer’s code differs slightly from ElevationKatz, the underlying principle remains consistent, indicating a lineage of exploitation that predates VoidStealer’s emergence.

Despite the ongoing cat-and-mouse game between threat actors and cybersecurity experts, VoidStealer’s adoption of this technique underscores the evolving landscape of cyber threats and the need for continuous vigilance.

Conclusion

VoidStealer’s emergence as a potent infostealer underscores the evolving sophistication of malware and the relentless pursuit of vulnerabilities in popular browsers like Chrome. As cybercriminals continue to innovate and adapt, it is imperative for users and security professionals alike to remain vigilant and implement robust security measures to safeguard against emerging threats.

Trending