Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

How VoidStealer bypasses Chrome’s protections to hijack sessions and steal data | Kaspersky official blog

0
Medium
Malware
Published: Wed May 06 2026 (05/06/2026, 11:42:31 UTC)
Source: Kaspersky Security Blog

Description

The VoidStealer malware employs a new technique to circumvent Chrome’s App-Bound Encryption mechanism, gaining access to session cookies and other sensitive user data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/06/2026, 11:52:50 UTC

Technical Analysis

VoidStealer malware employs a novel technique to bypass Google Chrome's App-Bound Encryption (ABE), a security mechanism introduced in Chrome 127 (July 2024) to protect session cookies and other sensitive data. ABE ties encryption keys to the Chrome application, preventing other processes from accessing the master key used to decrypt stored data. VoidStealer circumvents this by attaching itself as a debugger to the Chrome process, setting breakpoints at the code section where decryption occurs, and reading the master key directly from Chrome's memory when it is temporarily in plaintext. This approach allows the malware to hijack authenticated sessions and steal sensitive user data. The malware also impacts other Chromium-based browsers implementing ABE. VoidStealer is distributed as malware-as-a-service, facilitating widespread use by attackers. The analysis is based on a detailed Kaspersky blog post dated May 6, 2026. No vendor advisory or patch information is available.

Potential Impact

The malware enables attackers to bypass Chrome's intended protection of session cookies and sensitive data, allowing hijacking of authenticated sessions and theft of personal or financial information. This undermines the security improvements introduced by App-Bound Encryption, exposing users of Chrome and other Chromium-based browsers on Windows to data theft. The malware's debugger-based memory extraction technique does not require privilege escalation but relies on the ability to run code with the user's privileges. The widespread availability of VoidStealer as malware-as-a-service increases the risk of mass infections. There is no indication that this threat currently exploits zero-day vulnerabilities or that it is actively exploited in the wild at scale.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Users should avoid installing software from untrusted sources to reduce infection risk. Keeping operating systems and software up to date is recommended to mitigate exploitation of known vulnerabilities. Use robust security solutions to detect and block suspicious activities in real time. Avoid storing passwords and financial information directly in browsers; instead, use dedicated secure password managers. Since the malware exploits a runtime memory exposure, traditional encryption mechanisms alone may not suffice. No official fix or update from Chrome or other vendors is mentioned in the available data.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/chrome-application-bound-encryption-bypass-voidstealer/55735/","fetched":true,"fetchedAt":"2026-05-06T11:52:38.656Z","wordCount":1689}

Threat ID: 69fb2b86cbff5d8610db203e

Added to database: 5/6/2026, 11:52:38 AM

Last enriched: 5/6/2026, 11:52:50 AM

Last updated: 5/7/2026, 8:18:38 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses