Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    Moon Astronaut Captures Shot of Earth That Lets You See Its Thin Atmosphere Perfectly

    April 8, 2026

    Razr 70 Ultra leak shows how Motorola plans to impress you with bold new finishes

    April 8, 2026

    How to edit Images using Pixa (PixelCut)?

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Tech Gadgets»Stolen session cookies give hackers full account access for under a thousand dollars per month without raising alerts
    Stolen session cookies give hackers full account access for under a thousand dollars per month without raising alerts
    Tech Gadgets

    Stolen session cookies give hackers full account access for under a thousand dollars per month without raising alerts

    The Tech GuyBy The Tech GuyApril 7, 2026No Comments3 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement




    • Storm enables session hijacking that bypasses passwords and multi-factor authentication
    • Attackers can restore stolen sessions remotely without triggering standard security alerts
    • Malware operates server-side to process encrypted browser credentials for stealthy exploitation

    A new strain of infostealer malware dubbed Storm is changing how account compromise works, experts have warned.

    Advertisement

    New findings from Varonis Threat Labs have outlined how this strain moves away from passwords and focuses on session cookies that keep users logged in.

    These cookies allow attackers to bypass login steps entirely, including multi-factor authentication, which traditionally acts as a second layer of protection.

    Article continues below


    You may like

    Session hijacking replaces passwords

    Once a session is stolen, the attacker can access accounts as if they were the legitimate user without triggering standard authentication checks.

    Storm collects browser data, including saved credentials, session cookies, autofill entries, and authentication tokens, and handles both Chromium- and Gecko-based browsers on the server side, including Firefox, Waterfox, and Pale Moon, giving it broader coverage than rivals like StealC V2.

    Unlike older tools, it avoids decrypting this information on the victim’s device and instead sends encrypted data to attacker-controlled servers for processing.

    This approach reduces visibility for endpoint security tools, which typically monitor suspicious activity on local systems.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    Once the data is processed, attackers can restore sessions remotely using tools built into the malware’s control panel.

    By combining stolen session tokens with proxy servers that match the victim’s location, attackers can log in without raising suspicion from security systems.

    Storm is sold as a subscription service, lowering the barrier to entry for cybercrime by offering a complete toolkit for data theft and account hijacking.


    What to read next

    Pricing tiers include a $300 seven-day demo, a $900-per-month standard plan, and a $1,800-per-month team license that supports up to 100 operators and 200 builds.

    Even after a subscription expires, previously deployed malware continues collecting data, allowing ongoing exploitation without additional cost.

    At the time of the investigation, the logs panel contained 1,715 entries spanning India, the United States, Brazil, Indonesia, Ecuador, Vietnam, and several other countries.

    Credentials tagged to Google, Facebook, Twitter, Coinbase, Binance, Blockchain.com, and Crypto.com appear across multiple entries, a pattern which suggests that active campaigns target both corporate and cryptocurrency accounts.

    Beyond login sessions, the malware gathers documents, screenshots, messaging app data, and cryptocurrency wallet information.

    This capability allows attackers to move laterally within systems, access sensitive files, and potentially escalate attacks into broader compromises that affect entire organizations.

    This development shows how techniques once associated with advanced attackers are becoming widely accessible through subscription-based services.

    Organizations that rely solely on traditional endpoint protection should be concerned.

    However, organizations with strong behavioral analytics and network monitoring may already have the visibility needed to detect the unusual traffic patterns that stolen session restoration inevitably creates.


    Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

    And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.



    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    Samsung Galaxy A57 review – GSMArena.com tests

    April 8, 2026

    New Google Photos trick lets you save time while sharing images

    April 8, 2026

    This Fire TV feature made me forget all about picture quality

    April 8, 2026

    Latest Xperia 1 VIII renders confirm new camera island design

    April 7, 2026

    How to open apps with your Samsung phone’s fingerprint sensor

    April 7, 2026

    I really want Apple to make another plastic iPhone, but it won’t

    April 7, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    ChatGPT Group Chats are here … but not for everyone (yet)

    November 14, 20258 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    Moon Astronaut Captures Shot of Earth That Lets You See Its Thin Atmosphere Perfectly

    April 8, 2026

    Razr 70 Ultra leak shows how Motorola plans to impress you with bold new finishes

    April 8, 2026

    How to edit Images using Pixa (PixelCut)?

    April 8, 2026
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.