Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户给的指示很明确,不需要以“文章内容总结”或“这篇文章”开头,直接写描述即可。 首先,我得仔细阅读文章内容。文章主要讲的是Google推出了一项名为Device Bound Session Credentials(DBSC)的安全功能,适用于Windows系统的Chrome浏览器用户。DBSC通过将认证会话与特定设备绑定,利用硬件安全模块(如TPM)生成密钥对,防止会话cookie被窃取。一旦cookie被盗,也会很快过期失效。此外,DBSC还考虑了隐私保护和跨设备扩展的计划。 接下来,我需要提取关键信息:Google、DBSC、Windows Chrome用户、防止会话劫持、硬件安全模块、密钥对、cookie过期、隐私保护、未来扩展到macOS和其他设备。 然后,我要把这些信息浓缩成一句话,不超过100字。确保涵盖主要功能和优势,同时保持简洁明了。 最后,检查是否符合用户的要求:没有使用特定的开头语句,直接描述内容,并且控制在100字以内。 </think> Google推出Device Bound Session Credentials(DBSC)功能,旨在防止网络会话劫持。该功能通过将认证会话与特定设备绑定,并利用硬件安全模块生成不可导出的密钥对来保护用户隐私。一旦会话cookie被盗用或泄露,在短时间内就会失效。目前该功能已向Windows版Chrome浏览器用户开放,并计划扩展至macOS及其他设备。 2026-4-10 07:58:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Malware / Browser Security

Device Bound Session Credentials

Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months after it began testing the security feature in open beta.

The public availability is currently limited to Windows users on Chrome 146, with macOS expansion planned in an upcoming Chrome release.

"This project represents a significant step forward in our ongoing efforts to combat session theft, which remains a prevalent threat in the modern security landscape," Google's Chrome and Account Security teams said in a Thursday post.

Session theft involves the covert exfiltration of session cookies from the web browser, either by gathering existing ones or waiting for a victim to log in to an account, to an attacker-controlled server.

Typically, this happens when users inadvertently download information-stealing malware into their systems. These stealer malware families – of which there are many, such as Atomic, Lumma, and Vidar Stealer – come with capabilities to harvest a wide range of information from compromised systems, including cookies.

Because session cookies often have extended lifespans, attackers can leverage them to gain unauthorized access to victims' online accounts without having to know their passwords. Once collected, these tokens are packaged and sold to other threat actors for financial gain. Cybercriminals who acquire them can follow up with their attacks of their own.

DBSC, first announced by Google in April 2024, aims to counter this abuse by cryptographically tying the authentication session to a specific device. In doing so, the idea is to render cookies worthless even if they get stolen by malware.

"It does this using hardware-backed security modules, such as the Trusted Platform Module (TPM) on Windows and the Secure Enclave on macOS, to generate a unique public/private key pair that cannot be exported from the machine," Google explained.

"The issuance of new short-lived session cookies is contingent upon Chrome proving possession of the corresponding private key to the server. Because attackers cannot steal this key, any exfiltrated cookies quickly expire and become useless to those attackers."

In the event a user's device does not support secure key storage, DBSC gracefully falls back to standard behavior without breaking the authentication flow, Google said in its developer documentation.

The tech giant said it has observed a significant reduction in session theft since its launch, an early indication of the success of the countermeasure. The official launch is just the start, as the company plans to bring DBSC to a broader range of devices and introduce advanced capabilities to better integrate with enterprise environments.

Google, which worked with Microsoft to design the standard with an aim to make it an open web standard, also emphasized that the DBSC architecture is private by design and that the distinct key approach ensures that websites cannot use the session credentials to correlate a user's activity across different sessions or sites on the same device.

"Furthermore, the protocol is designed to be lean: it does not leak device identifiers or attestation data to the server beyond the per-session public key required to certify proof of possession," it added. "This minimal information exchange ensures DBSC helps secure sessions without enabling cross-site tracking or acting as a device fingerprinting mechanism."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/google-rolls-out-dbsc-in-chrome-146-to.html
如有侵权请联系:admin#unsafe.sh