5 Ways to Hijack Identities by Abusing the Chromium Browsers

July 28, 2023

The techniques, tactics and procedures used bypass security controls continue to evolve at a rapid pace. Web-based applications have become essential to life and work, and our web browsers, which seemingly know everything about us, are prime targets for credential stealing and session hijacking attacks. In fact, threat actors stealing malware commonly target browsers to compromise stored credentials and session cookies. Although this has been a common practice for years, the adoption of SaaS services have made browser-based attacks more prevalent than ever. Like updating passwords on a regular basis, clearing web browser cookies is a cyber hygiene practice neglected by most. If hijacked, these cookies enable attackers to bypass Multi-Factor Authentication (MFA) and Single Sign-on (SSO) security measures and gain access to critical business applications and data. Threat actors can use this technique as a jumping point to deploy malicious code, social engineer and further carry out their attack.

Join CyberArk Research Evangelist, Andy Thompson as he demonstrates how cookies and session IDs can be stolen with ease and how CyberArk Endpoint Privilege Manager (EPM) credential theft protection can prevent this and many other emerging techniques.

Viewers of this webinar will walk away with:

  • Understanding of various credential and cookie theft attack vectors, including several new tactics discovered by CyberArk Labs researchers.
  • A few real-life examples of how these techniques continue to be the key for high profile breaches
  • How CyberArk EPM threat prevention policies prevent cookie, passwords and security tokens theft on your endpoints
Previous Article
Making Zero Standing Privileges a Reality
Making Zero Standing Privileges a Reality

The most significant change in the lifespan of identity security thus far is zero standing privileges (ZSP)...

Next Video
Mastering Endpoint Security The Power of Least Privilege
Mastering Endpoint Security The Power of Least Privilege

Join our experts as we explore the critical role of least privilege in endpoint security and how to strengt...