Google Chrome adds infostealer protection against session cookie theft
嗯,用户让我用中文总结一下这篇文章,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。好的,我先看看文章讲的是什么。 文章主要介绍了Google在Chrome 146版本中为Windows用户推出了一项新的安全功能,叫做Device Bound Session Credentials(DBSC)。这个功能主要是为了防止恶意软件窃取用户的会话cookie。通过将用户的会话与特定的硬件设备(比如TPM芯片)绑定,确保即使cookie被窃取,攻击者也无法利用这些信息,因为私钥无法从设备中导出。 另外,文章提到MacOS用户将在未来的某个Chrome版本中获得这项功能。DBSC协议还设计得非常注重隐私,每个会话都有独特的密钥,防止网站追踪用户活动。Google和微软合作开发了这个协议,并且已经进行了测试,结果显示会话盗窃事件有所减少。 好的,现在我要把这些要点浓缩到100字以内。首先说明Google推出了DBSC保护功能,用于阻止恶意软件窃取会话cookie。然后提到它是通过将用户会话与设备硬件绑定来实现的。接着可以提到Windows使用TPM芯片,MacOS使用Secure Enclave。最后强调私钥无法导出,防止攻击者利用窃取的数据。 再检查一下字数是否符合要求。嗯,差不多了。 </think> Google推出Device Bound Session Credentials(DBSC)保护功能,在Chrome 146中阻止恶意软件窃取会话cookie。该功能通过将用户会话与设备硬件绑定,并使用安全芯片生成唯一密钥来防止数据泄露。Windows使用TPM芯片,MacOS使用Secure Enclave。私钥无法导出,确保攻击者无法利用窃取的会话数据。 2026-4-9 18:45:12 Author: www.bleepingcomputer.com(查看原文) 阅读量:9 收藏

Google Chrome adds infostealer protection against session cookie theft

Google has rolled out Device Bound Session Credentials (DBSC) protection in Chrome 146 for Windows, designed to block info-stealing malware from harvesting session cookies.

macOS users will benefit from this security feature in a future Chrome release that has yet to be announced.

The new protection has been announced in 2024, and it works by cryptographically linking a user's session to their specific hardware, such as a computer's security chip - the Trusted Platform Module (TPM) on Windows and the Secure Enclave on macOS.

Wiz

Since the unique public/private keys for encrypting and decrypting sensitive data are generated by the security chip, they cannot be exported from the machine.

This prevents the attacker from using stolen session data because the unique private key protecting it cannot be exported from the machine.

“The issuance of new short-lived session cookies is contingent upon Chrome proving possession of the corresponding private key to the server,” Google says in an announcement today.

Without this key, any exfiltrated session cookie expires and becomes useless to an attacker almost immediately.

The Device Bound Session Credentials (DBSC) flow
Browser-server interaction in the context of the DBSC protocol
source: Google

A session cookie acts as an authentication token, typically with a longer validity time, and is created server-side based on your username and password.

The server uses the session cookie for identification and sends it to the browser, which presents it when you access the online service.

Because they allow authenticating to a server without providing credentials, threat actors use specialized malware called infostealer to collect session cookies.

Google says that multiple infostealer malware families, like LummaC2, “have become increasingly sophisticated at harvesting these credentials,” allowing hackers to gain access to users’ accounts.

“Crucially, once sophisticated malware has gained access to a machine, it can read the local files and memory where browsers store authentication cookies. As a result, there is no reliable way to prevent cookie exfiltration using software alone on any operating system” - Google

The DBSC protocol was built to be private by design, with each session being backed by a distinct key. This prevents websites from correlating user activity across multiple sessions or sites on the same device.

Additionally, the protocol enables minimal information exchange that requires only the per-session public key necessary to certify proof of possession, and does not leak device identifiers.

In a year of testing an early version of DBSC in partnership with multiple web platforms, including Okta, Google observed a notable decline in session theft events.

Google partnered with Microsoft for developing the DBSC protocol as an open web standard and received input “from many in the industry that are responsible for web security.”

Websites can upgrade to the more secure, hardware-bound sessions by adding a dedicated registration and refresh endpoints to their backends without sacrificing compatibility with the existing frontend.

Web developers can turn to Google’s guide for DBSC implementation details. Specifications are available on the World Wide Web Consortium (W3C) website, while an explainer can be found on GitHub.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/google-chrome-adds-infostealer-protection-against-session-cookie-theft/
如有侵权请联系:admin#unsafe.sh