• Latest
  • Trending
  • All
  • Industry
  • Compliance
  • Global Trade
  • Industry
  • Sustainability & Ethics
  • Video
  • Security & Risk
Keyboard with a Google search button for quick and convenient access to the internet.

Exploitation of Google Authentication Vulnerability Raises Security Concerns

01/03/2024
Ghana Investment & Trade Week 2026 Set to Deliver Next-Level Investment and Trade Partnerships in West Africa

Ghana Investment & Trade Week 2026 Set to Deliver Next-Level Investment and Trade Partnerships in West Africa

03/05/2026
Central Asian Firms Strengthen Compliance Amid Rising Global Sanctions

Central Asian Firms Strengthen Compliance Amid Rising Global Sanctions

03/02/2026
EFTA–Singapore Digital Economy Agreement Enters into Force for Singapore and Norway

EFTA–Singapore Digital Economy Agreement Enters into Force for Singapore and Norway

03/02/2026
China Warns of National Security Risks From Third-Party Data Hosting After Overseas Cyberattack

China Warns of National Security Risks From Third-Party Data Hosting After Overseas Cyberattack

03/02/2026
India and Israel Agree to Expand Trade, Investment and Technology Cooperation

India and Israel Agree to Expand Trade, Investment and Technology Cooperation

03/02/2026
Oil Prices Surge Amid Middle East Disruptions

Oil Prices Surge Amid Middle East Disruptions

03/02/2026
UNR Med Integrates Artificial Intelligence into Medical Education

UNR Med Integrates Artificial Intelligence into Medical Education

02/27/2026
Argentina and Uruguay Ratify Mercosur–EU Trade Deal

Argentina and Uruguay Ratify Mercosur–EU Trade Deal

02/27/2026
Gartner Report Examines Agentic AI’s Impact on Supply Chain Roles

Gartner Report Examines Agentic AI’s Impact on Supply Chain Roles

02/27/2026
Ecuador Raises Tariffs on Colombian Imports to 50%

Ecuador Raises Tariffs on Colombian Imports to 50%

02/27/2026
Court Deadline Looms on Tariff Refunds

Court Deadline Looms on Tariff Refunds

02/27/2026
U.S. Plans Tariff Hike to 15% for Certain Nations, Raising Supply Chain Implications

U.S. Plans Tariff Hike to 15% for Certain Nations, Raising Supply Chain Implications

02/26/2026
supplychainreport
Thursday, March 12, 2026
  • Home
  • Industry
    • Supply Chain
    • Logistics & Transportation
    • Importing & Exporting
    • Manufacturing
    • Warehousing & Distribution
  • Compliance
    • Supply Chain Transparency
    • Anti-Money Laundering (AML)
    • Know Your Customer (KYC)
    • Risk Management
    • Export Controls
    • Sanctions
  • Global Trade
    • Market Trends
    • Economic Indicators
    • Sourcing
    • Trade Policies
    • International Relations
    • Trade Agreements
    • Tariffs & Duties
    • Import/Export Statistics
  • Luxury Goods
  • Industry
    • Blockchain in Supply Chain
    • Importing & Exporting
    • Automation & Robotics
    • Artificial Intelligence in Trade
    • Data & Analytics
  • Sustainability & Ethics
    • Green Supply Chains
    • Sustainable Logistics
    • Ethical Sourcing
    • Corporate Social Responsibility
    • Environmental Policies
  • Security & Risk
    • Cybersecurity in Trade
    • Fraud & Scams
    • Risk Mitigation
    • Security Protocols
    • Data Protection
  • ITC News
    • ITC Featured Members
    • ITC Business Councils Highlights
  • Events
    • Upcoming Conferences
    • Upcoming FREE Educational Webinars
No Result
View All Result
supplychainreport
No Result
View All Result

Exploitation of Google Authentication Vulnerability Raises Security Concerns

by Richie
01/03/2024
in Cybersecurity in Trade, Security & Risk

YOU MAY ALSO LIKE

China Warns of National Security Risks From Third-Party Data Hosting After Overseas Cyberattack

U.S. Trucking Regulator Stands Firm on Foreign Driver Rules Despite Multi‑State Pushback

A recently identified vulnerability in Google’s authentication process, characterized by some as a zero-day, has become a target for threat actors employing information-stealing tactics. Cybersecurity firm CloudSEK reports that this vulnerability allows threat actors to regenerate persistent Google cookies, providing ongoing access to Google services. The issue is linked to the undocumented MultiLogin endpoint, designed for synchronizing accounts across various Google services when combined with account ID and tokens obtained from Chrome.

The vulnerability involves extracting the Google Accounts and ID Administration (GAIA) IDs and encrypted tokens from logged-in accounts in Chrome. The attackers decrypt the tokens using an encryption key stored in Chrome’s Local State within the UserData directory. This process enables threat actors to generate Google cookies persistently, leading to prolonged access to Google services.

Initially highlighted by a malware developer in October, the vulnerability gained traction, with the Lumma infostealer family implementing the technique by mid-November. Despite Lumma encrypting the token-GAIA ID pair with its own keys, other infostealer groups adopted the method by the end of December.

The widespread adoption of this technique raises concerns about potential cyberattacks, with corporate email addresses vulnerable to ransomware attacks and other malicious activities. The exploit remains effective even after users reset their passwords, allowing for prolonged and potentially unnoticed exploitation of user accounts and data.

Google was alerted about the vulnerability over a month ago, and the company has taken action to secure any compromised accounts detected. However, the persistence of access and potential for prolonged exploitation has prompted concerns about the need for enhanced security measures. CloudSEK emphasizes the importance of users continuously removing malware from their computers and recommends enabling Enhanced Safe Browsing in Chrome to guard against phishing and malware downloads.

SecurityWeek has reached out to Google for a statement on the matter, and updates will be provided as soon as a response is received. Google has acknowledged recent reports of a malware family stealing session tokens and emphasizes its routine efforts to upgrade defenses against such techniques. The company assures users that compromised accounts are addressed promptly, and stolen sessions can be invalidated by signing out of the affected browser or remotely revoking them via the user’s devices page. Google will continue monitoring the situation and provide updates as needed, encouraging users to take steps to remove malware and enhance browser security.

Stay updated with supply chain news at The Supply Chain Report. Learn more about international trade at ADAMftd.com with free tools.

#GoogleVulnerability #ZeroDay #Cybersecurity #CloudSEK #InformationStealing #LummaInfostealer #CyberAttacks #MalwarePrevention #EnhancedSafeBrowsing #DataProtection

ShareTweet

Share Your News

Whether it’s a groundbreaking achievement, a heartwarming tale, or an insightful perspective, we want to hear it. Share your news with us, and let’s amplify your voice in the digital symphony of stories.

Submit

A man is riding a bike on a hill.

The Supply Chain Report is your essential daily news website, serving as a trusted source for comprehensive coverage of the complex and ever-evolving global supply chain dynamics. Our expert team delves into the intricacies of international trade, manufacturing, logistics, importing, exporting, and supply chain management; providing in-depth analysis and up-to-date news on the latest trends, disruptions, and technological advancements affecting industries worldwide. From detailed reports on international trade through to insights into procurement strategies and inventory management, we offer valuable content that helps professionals stay informed and make knowledgeable decisions in a fast-paced market.

Each day, we bring you cutting-edge news and expert commentary that dissect significant international trade and supply chain issues Our coverage spans a wide array of sectors including manufacturing, retail, healthcare, food, consumer goods, and technology, ensuring that no matter your field, you have the strategic information needed to navigate the challenges and opportunities of today’s supply chain landscape. By synthesizing complex data and presenting actionable insights, The Supply Chain Report empowers business leaders, policymakers, and logistics professionals to optimize their operations and drive forward with confidence in an interconnected world.

Connect With Us

  • About
  • Events
  • Privacy Policy
  • Contact Us

© 2024 International Centre for Trade Transparency Limited. Incorporated in the United Kingdom.

No Result
View All Result
  • Home
  • Industry
    • Supply Chain
    • Logistics & Transportation
    • Importing & Exporting
    • Manufacturing
    • Warehousing & Distribution
  • Compliance
    • Supply Chain Transparency
    • Anti-Money Laundering (AML)
    • Know Your Customer (KYC)
    • Risk Management
    • Export Controls
    • Sanctions
  • Global Trade
    • Market Trends
    • Economic Indicators
    • Sourcing
    • Trade Policies
    • International Relations
    • Trade Agreements
    • Tariffs & Duties
    • Import/Export Statistics
  • Luxury Goods
  • Industry
    • Blockchain in Supply Chain
    • Importing & Exporting
    • Automation & Robotics
    • Artificial Intelligence in Trade
    • Data & Analytics
  • Sustainability & Ethics
    • Green Supply Chains
    • Sustainable Logistics
    • Ethical Sourcing
    • Corporate Social Responsibility
    • Environmental Policies
  • Security & Risk
    • Cybersecurity in Trade
    • Fraud & Scams
    • Risk Mitigation
    • Security Protocols
    • Data Protection
  • ITC News
    • ITC Featured Members
    • ITC Business Councils Highlights
  • Events
    • Upcoming Conferences
    • Upcoming FREE Educational Webinars

© 2024 International Centre for Trade Transparency Limited. Incorporated in the United Kingdom.