Researchers spotted a new cookie-stealing Trojan called “Cookiethief” that is targeting users’ social media accounts and browsers.
Kaspersky Lab observed that the primary aim of the malware, which they detected as Trojan-Spy.AndroidOS.Cookiethief, was to gain root privileges on a victim’s Android device. The cookie-stealing malware then leveraged that level of access to transfer cookies employed by the user’s browser and Facebook account to a command-and-control (C&C) server under the attacker’s control. It did so not by exploiting a vulnerability in either Facebook or the browser. Instead, it connected with a backdoor installed on the same device and used it to execute commands.
To avoid raising red flags with Facebook, Cookiethief employed Trojan-Proxy.AndroidOS.Youzicheng to run a proxy on the victim’s device. This step helped the malware bypass security solutions on the social network by disguising the attacker’s request as one from a legitimate user account.
Social Media Cookie Stealers Aplenty
Cookiethief is not the first malware to target social media users’ cookies. Back in April 2018, for instance, Radware detected an attack campaign that relied on a malware family called “Stresspaint” to infect 40,000 users and steal tens of thousands of Facebook user credentials/cookies within a matter of days. In December 2019, Naked Security reported on a threat called “AdKoob” that dug into a victim’s browser database of cookies for the purpose of looking up their ad spending on Facebook.
Defend Against Cookie-Stealing Trojans
Stealing a user’s cookies is no joke. Web services like Facebook leverage cookies to store a unique session ID on a victim’s device. That session ID can permit the user to regain access to their account without providing their login credentials. This means that, in the wrong hands, cookies can enable digital attackers to assume the identities of legitimate users and effectively bypass identity and access management (IAM) features such as multifactor authentication (MFA).
Threat actors can then leverage that disguise to conduct secondary attacks. In the case of Cookiethief, the attackers could have used a module to distribute spam on social networks and messengers, activity that could have hurt the victim’s reputation.
Acknowledging this activity, security professionals can help protect their organizations against a cookie-stealing Trojan like Cookiethief by using the latest threat intelligence to stay vigilant and aware of the malware threats targeting their users. Companies should also augment the strength of their IAM program by investing in a modern system that extends across an organization’s entire IT infrastructure, including the cloud.
David Bisson is an infosec news junkie and security journalist. He works as Contributing Editor for Graham Cluley Security News and Associate Editor for Trip...