March 16, 2020 By David Bisson 2 min read

Researchers spotted a new cookie-stealing Trojan called “Cookiethief” that is targeting users’ social media accounts and browsers.

Kaspersky Lab observed that the primary aim of the malware, which they detected as Trojan-Spy.AndroidOS.Cookiethief, was to gain root privileges on a victim’s Android device. The cookie-stealing malware then leveraged that level of access to transfer cookies employed by the user’s browser and Facebook account to a command-and-control (C&C) server under the attacker’s control. It did so not by exploiting a vulnerability in either Facebook or the browser. Instead, it connected with a backdoor installed on the same device and used it to execute commands.

To avoid raising red flags with Facebook, Cookiethief employed Trojan-Proxy.AndroidOS.Youzicheng to run a proxy on the victim’s device. This step helped the malware bypass security solutions on the social network by disguising the attacker’s request as one from a legitimate user account.

Social Media Cookie Stealers Aplenty

Cookiethief is not the first malware to target social media users’ cookies. Back in April 2018, for instance, Radware detected an attack campaign that relied on a malware family called “Stresspaint” to infect 40,000 users and steal tens of thousands of Facebook user credentials/cookies within a matter of days. In December 2019, Naked Security reported on a threat called “AdKoob” that dug into a victim’s browser database of cookies for the purpose of looking up their ad spending on Facebook.

Defend Against Cookie-Stealing Trojans

Stealing a user’s cookies is no joke. Web services like Facebook leverage cookies to store a unique session ID on a victim’s device. That session ID can permit the user to regain access to their account without providing their login credentials. This means that, in the wrong hands, cookies can enable digital attackers to assume the identities of legitimate users and effectively bypass identity and access management (IAM) features such as multifactor authentication (MFA).

Threat actors can then leverage that disguise to conduct secondary attacks. In the case of Cookiethief, the attackers could have used a module to distribute spam on social networks and messengers, activity that could have hurt the victim’s reputation.

Acknowledging this activity, security professionals can help protect their organizations against a cookie-stealing Trojan like Cookiethief by using the latest threat intelligence to stay vigilant and aware of the malware threats targeting their users. Companies should also augment the strength of their IAM program by investing in a modern system that extends across an organization’s entire IT infrastructure, including the cloud.

More from

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now. The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP). DMP’s benefits and vulnerabilities DMP predicts memory addresses that the…

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today