{"id":45289,"date":"2026-04-10T03:31:21","date_gmt":"2026-04-09T19:31:21","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/google-chrome-adds-infostealer-protection-against-session-cookie-theft\/"},"modified":"2026-04-10T03:31:21","modified_gmt":"2026-04-09T19:31:21","slug":"google-chrome-adds-infostealer-protection-against-session-cookie-theft","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/google-chrome-adds-infostealer-protection-against-session-cookie-theft\/","title":{"rendered":"Google Chrome adds infostealer protection against session cookie theft"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2023\/06\/16\/Google-Chrome-headpic.jpg\" width=\"1600\" alt=\"Google Chrome adds infostealer protection against session cookie theft\"><\/p>\n<p>Google has rolled out Device Bound Session Credentials (DBSC) protection in Chrome 146 for Windows, designed to block info-stealing malware from harvesting session cookies.<\/p>\n<p>macOS users will benefit from this security feature in a future Chrome release that has yet to be announced.<\/p>\n<p>The new protection has been <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-chrome-feature-aims-to-stop-hackers-from-using-stolen-cookies\/\" target=\"_blank\" rel=\"nofollow noopener\">announced&nbsp;in 2024<\/a>, and it works by cryptographically linking a user&#8217;s session to their specific hardware, such as a computer&#8217;s security chip &#8211; the Trusted Platform Module (TPM) on Windows and the Secure Enclave on macOS.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Google Chrome adds infostealer protection against session cookie theft\"><\/a> <\/div>\n<p>Since the unique public\/private keys for encrypting and decrypting sensitive data are generated by the security chip, they cannot be exported from the machine.<\/p>\n<p>This prevents the attacker from using stolen session data because the unique private key protecting it cannot be exported from the machine.<\/p>\n<p>&ldquo;The issuance of new short-lived session cookies is contingent upon Chrome proving possession of the corresponding private key to the server,&rdquo; Google says in an announcement today.<\/p>\n<p>Without this key, any exfiltrated session cookie expires and becomes useless to an attacker almost immediately.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"665\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1100723\/Chrome_DBSC-flow.png\" width=\"800\" alt=\"Google Chrome adds infostealer protection against session cookie theft\"><figcaption><strong>Browser-server interaction in the context of the DBSC protocol<\/strong><br \/><em>source: Google<\/em><\/figcaption><\/figure>\n<\/div>\n<p>&nbsp;<\/p>\n<p>A session cookie acts as an authentication token, typically with a longer validity time, and is created server-side based on your username and password.<\/p>\n<p>The server uses the session cookie for identification and sends it to the browser, which presents it when you access the online service.<\/p>\n<p>Because they allow authenticating to a server without providing credentials, threat actors use specialized malware called infostealer to collect session cookies.<\/p>\n<p>Google says that multiple infostealer malware families, like LummaC2, &ldquo;have become increasingly sophisticated at harvesting these credentials,&rdquo; allowing hackers to gain access to users&rsquo; accounts.<\/p>\n<div style=\"background:#eeeeee; border:1px solid #cccccc; padding:5px 10px\">\n<p>&ldquo;Crucially, once sophisticated malware has gained access to a machine, it can read the local files and memory where browsers store authentication cookies. As a result, there is no reliable way to prevent cookie exfiltration using software alone on any operating system&rdquo; &#8211; <a href=\"https:\/\/security.googleblog.com\/2026\/04\/protecting-cookies-with-device-bound.html\" rel=\"nofollow noopener\">Google<\/a><\/p>\n<\/p><\/div>\n<p>The DBSC protocol was built to be private by design, with each session being backed by a distinct key. This prevents websites from correlating user activity across multiple sessions or sites on the same device.<\/p>\n<p>Additionally, the protocol enables minimal information exchange that requires only the per-session public key necessary to certify proof of possession, and does not leak device identifiers.<\/p>\n<p>In a year of testing an early version of DBSC in partnership with multiple web platforms, including Okta, Google observed a notable decline in session theft events.<\/p>\n<p>Google partnered with Microsoft for developing the DBSC protocol as an open web standard and received input &ldquo;from many in the industry that are responsible for web security.&rdquo;<\/p>\n<p>Websites can upgrade to the more secure, hardware-bound sessions by adding a dedicated registration and refresh endpoints to their backends without sacrificing compatibility with the existing frontend.<\/p>\n<p>Web developers can turn to Google&rsquo;s guide for <a href=\"https:\/\/developer.chrome.com\/docs\/web-platform\/device-bound-session-credentials\" rel=\"nofollow noopener\">DBSC implementation details<\/a>. Specifications are available on the World Wide Web Consortium (W3C) website, while an explainer can be found on GitHub.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-chrome-adds-infostealer-protection-against-session-cookie-theft\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Google Chrome adds infostealer protection against session cookie theft\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-fixes-family-safety-bug-that-blocks-google-chrome-from-launching\/\">Microsoft fixes bug that blocked Google Chrome from launching<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-suspends-dev-accounts-for-high-profile-open-source-projects\/\">Microsoft suspends dev accounts for high-profile open source projects<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-rolls-out-fix-for-broken-windows-start-menu-search\/\">Microsoft rolls out fix for broken Windows Start Menu search<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/why-simple-breach-monitoring-is-no-longer-enough\/\">Why Simple Breach Monitoring is No Longer Enough<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit\/\">Disgruntled researcher leaks &ldquo;BlueHammer&rdquo; Windows zero-day exploit<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Google has rolled out Device Bound Session Credentials  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45289","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45289"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45289\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}