Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Media Briefing: Here are the hurdles to Perplexity’s pitch as the publisher-friendly LLM

    Confessions: How an indie agency’s over-reliance on AI drove it out of business

    In Graphic Detail: AI adoption increases, but U.S. consumers are still wary

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Blue-collar jobs are gaining popularity as AI threatens office work

      August 17, 2025

      Man who asked ChatGPT about cutting out salt from his diet was hospitalized with hallucinations

      August 15, 2025

      What happens when chatbots shape your reality? Concerns are growing online

      August 14, 2025

      Scientists want to prevent AI from going rogue by teaching it to be bad first

      August 8, 2025

      AI models may be accidentally (and secretly) learning each other’s bad behaviors

      July 30, 2025
    • Business

      Why Certified VMware Pros Are Driving the Future of IT

      August 24, 2025

      Murky Panda hackers exploit cloud trust to hack downstream customers

      August 23, 2025

      The rise of sovereign clouds: no data portability, no party

      August 20, 2025

      Israel is reportedly storing millions of Palestinian phone calls on Microsoft servers

      August 6, 2025

      AI site Perplexity uses “stealth tactics” to flout no-crawl edicts, Cloudflare says

      August 5, 2025
    • Crypto

      Circle Partners With Finastra on $5 Trillion USDC Settlement

      August 28, 2025

      US and China Are Laundering Europeans’ Personal Data — Is Blockchain the Fix?

      August 28, 2025

      Does Coinbase’s New Hiring Policy Contradict US Federal Law?

      August 28, 2025

      Nvidia Earnings Report Shows Record Revenues Despite Zero Sales in China

      August 28, 2025

      One Sleuth Sounds The Alarm: Crypto Scam Prevention Isn’t Working

      August 28, 2025
    • Technology

      Media Briefing: Here are the hurdles to Perplexity’s pitch as the publisher-friendly LLM

      August 28, 2025

      Confessions: How an indie agency’s over-reliance on AI drove it out of business

      August 28, 2025

      In Graphic Detail: AI adoption increases, but U.S. consumers are still wary

      August 28, 2025

      Substack creators attribute their boost in subscribers to the platform’s community tools

      August 28, 2025

      Warner Bros. Discovery, Critical Mass and Instacart are finalists for this year’s Digiday Awards

      August 28, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Business Technology»Cookie-Bite attack PoC uses Chrome extension to steal session tokens
    Business Technology

    Cookie-Bite attack PoC uses Chrome extension to steal session tokens

    TechAiVerseBy TechAiVerseApril 22, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Cookie-Bite attack PoC uses Chrome extension to steal session tokens
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    BMI Calculator – Check your Body Mass Index for free!

    Cookie-Bite attack PoC uses Chrome extension to steal session tokens

    A proof-of-concept attack called “Cookie-Bite” uses a browser extension to steal browser session cookies from Azure Entra ID to bypass multi-factor authentication (MFA) protections and maintain access to cloud services like Microsoft 365, Outlook, and Teams.

    The attack was devised by Varonis security researchers, who shared a proof-of-concept (PoC) method involving a malicious and a legitimate Chrome extension. However, stealing session cookies is not novel, as infostealers and adversary-in-the-middle phishing attacks commonly target them.

    While Cookie-Bite isn’t an entirely new concept, it’s still noteworthy for its stealth and persistence.

    Cookie extension attack

    The Cookie-Bite attack consists of a malicious Chrome extension that acts as an infostealer, targeting the ‘ESTAUTH’ and ‘ESTSAUTHPERSISTNT’ cookies in Azure Entra ID, Microsoft’s cloud-based identity and access management (IAM) service.

    ESTAUTH is a transient session token that indicates that the user is authenticated and has completed MFA. It remains valid for the browser session for up to 24 hours and expires when the app is closed.

    ESTSAUTHPERSISTENT is the persistent version of the session cookie created when users opt to “Stay signed in” or when Azure applies the KMSI policy, keeping it valid for up to 90 days.

    It should be noted that while this extension was created to target Microsoft session cookies, it can be modified to target other services, including Google, Okta, and AWS cookies.

    Varonis’ malicious Chrome extension contains logic to monitor the victim’s login events, listening for tab updates that match Microsoft login URLs. 

    When a login occurs, it reads all cookies scoped to ‘login.microsoftonline.com,’ applies filtering to extract the two mentioned tokens, and exfiltrates the cookie JSON data to the attacker via a Google Form.

    “After packing the extension into a CRX file and uploading it to VirusTotal, the result shows that no security vendors currently detect it as malicious,” warned Varonis.

    Chrome extensions stealing Microsoft session cookies
    Source: Varonis

    If threat actors have access to the device, they can deploy a PowerShell script that runs via the Windows Task Scheduler to automate the re-injection of the unsigned extension at every launch of Chrome using developer mode.

    PowerShell used in the attack example
    Source: Varonis

    Once a cookie is stolen, the attackers inject it into the browser like any other stolen cookie. This can be done through tools like the legitimate Cookie-Editor Chrome extension, which allows the threat actor to import the stolen cookies into their browser under ‘login.microsoftonline.com.’

    After refreshing the page, Azure treats the attacker’s session as fully authenticated, bypassing MFA and giving the attacker the same level of access as the victim.

    Injecting the stolen cookie
    Source: Varonis

    From there, the attacker may use Graph Explorer to enumerate users, roles, and devices, send messages or access chats on Microsoft Teams, and read or download emails via Outlook Web.

    Further exploitation like privilege escalation, lateral movement, and unauthorized app registrations are also possible via tools like TokenSmith, ROADtools, and AADInternals.

    Overview of the Cookie-Bite attack
    Source: Varonis

    Microsoft flagged the researchers’ login attempts in the attack demonstration as “atRisk” due to them using a VPN, so monitoring for abnormal sign-ins is key to preventing these attacks.

    Additionally, it is recommended that conditional access policies (CAP) be enforced to limit logins to specific IP ranges and devices.

    Concerning Chrome extensions, it is recommended that Chrome ADMX policies be enforced to allow only pre-approved extensions to run and block users from the browser’s Developer Mode entirely.

    BMI Calculator – Check your Body Mass Index for free!

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleI’m definitely not ready for LG’s ‘emotionally aware’ TV ads
    Next Article Ex-Meta engineer raises $14M for Lace AI, a revenue generation software startup
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Why Certified VMware Pros Are Driving the Future of IT

    August 24, 2025

    Murky Panda hackers exploit cloud trust to hack downstream customers

    August 23, 2025

    The rise of sovereign clouds: no data portability, no party

    August 20, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025166 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202548 Views

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202530 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202525 Views
    Don't Miss
    Technology August 28, 2025

    Media Briefing: Here are the hurdles to Perplexity’s pitch as the publisher-friendly LLM

    Media Briefing: Here are the hurdles to Perplexity’s pitch as the publisher-friendly LLMThis Media Briefing…

    Confessions: How an indie agency’s over-reliance on AI drove it out of business

    In Graphic Detail: AI adoption increases, but U.S. consumers are still wary

    Substack creators attribute their boost in subscribers to the platform’s community tools

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Media Briefing: Here are the hurdles to Perplexity’s pitch as the publisher-friendly LLM

    August 28, 20252 Views

    Confessions: How an indie agency’s over-reliance on AI drove it out of business

    August 28, 20252 Views

    In Graphic Detail: AI adoption increases, but U.S. consumers are still wary

    August 28, 20252 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.