Malware Leveraging Google Cookie Exploit via OAuth2 Functionality
Among others, developers of the infamous Lumma, an infostealer malware, are already using the exploit by employing advanced tactics like token manipulation and encryption in targeted attacks. CloudSEK’s threat research team has reported a critical exploit affecting Google services, allowing threat actors to generate Google cookies continuously while ensuring continuous access to Google services even […]
Malware Leveraging Google Cookie Exploit via OAuth2 Functionality Read More »