VoidStealer uses debugger trick to steal Chrome’s encryption key

March 23, 20262 min read2 sources
Share:
VoidStealer uses debugger trick to steal Chrome’s encryption key

A newly reported information stealer called VoidStealer can bypass Google Chrome’s Application-Bound Encryption (ABE) on Windows by using a debugger-based technique to extract the browser’s master key, according to BleepingComputer. With that key, the malware can decrypt sensitive browser data including cookies, saved credentials, and session tokens that ABE was designed to better protect.

The technique matters because Chrome rolled out ABE in 2024 to make stolen browser databases less useful outside the original app and device context. VoidStealer does not appear to break Chrome’s encryption directly. Instead, it targets the point where the key is available during normal browser operation, showing how infostealers are shifting from offline file theft to runtime abuse of live processes.

That shift has practical consequences for both consumers and enterprises. Stolen cookies and session tokens can let attackers hijack accounts without needing a password reset workflow, and in some cases can sidestep MFA if a session is already authenticated. For business users, that raises the risk of unauthorized access to email, cloud dashboards, internal portals, and remote access services, including VPN sessions tied to browser-based authentication.

No CVE has been tied to the activity in current public reporting, and the story is better understood as a malware capability update than a single software flaw. The broader lesson is that endpoint compromise can still defeat protections meant to secure data at rest. If malware can run under the same user context, it may be able to wait until protected material is legitimately decrypted and then steal it from memory.

Defenders should treat browser secret theft as a full account-compromise risk. Recommended steps include revoking active sessions, rotating exposed credentials, enforcing phishing-resistant MFA where possible, reducing local admin rights, and monitoring for suspicious access to browser processes or debugging behavior. Browser hardening still raises attacker costs, but VoidStealer shows those costs are not high enough to stop adaptation.

Share:

// SOURCES

// RELATED

Lotus Wiper: A deep dive into the malware targeting Venezuela's energy sector

A new wiper malware, Lotus Wiper, was found targeting Venezuela's energy sector. Our analysis covers its destructive methods and geopolitical implicat

7 min readApr 23

UK regulator launches investigation into Telegram over child safety failures

The UK's communications regulator, Ofcom, has launched a formal investigation into Telegram over its failure to prevent the sharing of CSAM.

6 min readApr 22

UK regulator to probe Telegram, teen chat sites for potential child safety violations

Ofcom launches its first major investigation under the new Online Safety Act, targeting Telegram over allegations of CSAM distribution, setting a majo

6 min readApr 22

When code kills: Lawmakers weigh terrorism and homicide charges for hospital ransomware attacks

In the wake of devastating attacks on the healthcare sector, U.S. lawmakers are exploring unprecedented legal actions, including terrorism and homicid

7 min readApr 22