this post was submitted on 08 Jan 2024
199 points (93.8% liked)
Technology
59605 readers
3302 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Wow, this sounds a lot more serious than session hijacking. Are they straight up using Chrome's special token to generate brand new Google Account session tokens?
If so, i'm not sure how Google is going to fix that without wrecking the Chrome user experience for non tech savvy individuals
~~They're using some Google api to generate the cookie(s?) with the manipulated chrome token. To me it kinda sounded like Google is using an improper method to generate the chrome token and the hackers found a way to derive other valid chrome tokens from it.~~ Though I'm not an expert. Read it yourself to get the right picture.
Edit: This is the part of the article about it, rest seems to be about how the hackers encrypted their exploit to avoid detection:
Edit but there's some conflicting information on what to do:
From one of the hack tool changelogs:
I guess Google doesn't invalidate session cookies generated with the chrome token upon a password reset, but the chrome token itself gets invalidated and deletes the session cokkies on the browser side or something? Idk sounds whack