Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The state of DTC marketing in 2025: How brands and agencies are leveraging data and automation to fuel ROI

    LGBTQ+ publishers grapple with a Pride Month ad spend slowdown

    Why there’s a CPM slump in a growing CTV market

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Apple sued by shareholders for allegedly overstating AI progress

      June 22, 2025

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025
    • Business

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025

      Cookie-Bite attack PoC uses Chrome extension to steal session tokens

      April 22, 2025
    • Crypto

      How Plume Drove a 100% Jump in RWA Holders to Overtake Ethereum

      June 24, 2025

      $400 Million SHIB Supply Zone Might Prevent Shiba Inu From Ending Downtrend

      June 24, 2025

      Turkey Overhauls Crypto Regulations to Stop Money Laundering

      June 24, 2025

      What Crypto Whales Are Buying After Israel-Iran Ceasefire Announcement

      June 24, 2025

      Midnight Network Tokenomics Introduces Radically Accessible and Fair Token Distribution Model 

      June 24, 2025
    • Technology

      The state of DTC marketing in 2025: How brands and agencies are leveraging data and automation to fuel ROI

      June 25, 2025

      LGBTQ+ publishers grapple with a Pride Month ad spend slowdown

      June 25, 2025

      Why there’s a CPM slump in a growing CTV market

      June 25, 2025

      How TikTok’s ‘The Secret Lives of Mormon Wives’ landed on Hulu, with Select Management Group’s Danielle Pistotnik

      June 25, 2025

      Ad Tech Briefing: Cannes Lions’ biggest ad tech announcements show how TV is now programmatic

      June 25, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Business Technology»Cookie-Bite attack PoC uses Chrome extension to steal session tokens
    Business Technology

    Cookie-Bite attack PoC uses Chrome extension to steal session tokens

    TechAiVerseBy TechAiVerseApril 22, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Cookie-Bite attack PoC uses Chrome extension to steal session tokens
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Cookie-Bite attack PoC uses Chrome extension to steal session tokens

    A proof-of-concept attack called “Cookie-Bite” uses a browser extension to steal browser session cookies from Azure Entra ID to bypass multi-factor authentication (MFA) protections and maintain access to cloud services like Microsoft 365, Outlook, and Teams.

    The attack was devised by Varonis security researchers, who shared a proof-of-concept (PoC) method involving a malicious and a legitimate Chrome extension. However, stealing session cookies is not novel, as infostealers and adversary-in-the-middle phishing attacks commonly target them.

    While Cookie-Bite isn’t an entirely new concept, it’s still noteworthy for its stealth and persistence.

    Cookie extension attack

    The Cookie-Bite attack consists of a malicious Chrome extension that acts as an infostealer, targeting the ‘ESTAUTH’ and ‘ESTSAUTHPERSISTNT’ cookies in Azure Entra ID, Microsoft’s cloud-based identity and access management (IAM) service.

    ESTAUTH is a transient session token that indicates that the user is authenticated and has completed MFA. It remains valid for the browser session for up to 24 hours and expires when the app is closed.

    ESTSAUTHPERSISTENT is the persistent version of the session cookie created when users opt to “Stay signed in” or when Azure applies the KMSI policy, keeping it valid for up to 90 days.

    It should be noted that while this extension was created to target Microsoft session cookies, it can be modified to target other services, including Google, Okta, and AWS cookies.

    Varonis’ malicious Chrome extension contains logic to monitor the victim’s login events, listening for tab updates that match Microsoft login URLs. 

    When a login occurs, it reads all cookies scoped to ‘login.microsoftonline.com,’ applies filtering to extract the two mentioned tokens, and exfiltrates the cookie JSON data to the attacker via a Google Form.

    “After packing the extension into a CRX file and uploading it to VirusTotal, the result shows that no security vendors currently detect it as malicious,” warned Varonis.

    Chrome extensions stealing Microsoft session cookies
    Source: Varonis

    If threat actors have access to the device, they can deploy a PowerShell script that runs via the Windows Task Scheduler to automate the re-injection of the unsigned extension at every launch of Chrome using developer mode.

    PowerShell used in the attack example
    Source: Varonis

    Once a cookie is stolen, the attackers inject it into the browser like any other stolen cookie. This can be done through tools like the legitimate Cookie-Editor Chrome extension, which allows the threat actor to import the stolen cookies into their browser under ‘login.microsoftonline.com.’

    After refreshing the page, Azure treats the attacker’s session as fully authenticated, bypassing MFA and giving the attacker the same level of access as the victim.

    Injecting the stolen cookie
    Source: Varonis

    From there, the attacker may use Graph Explorer to enumerate users, roles, and devices, send messages or access chats on Microsoft Teams, and read or download emails via Outlook Web.

    Further exploitation like privilege escalation, lateral movement, and unauthorized app registrations are also possible via tools like TokenSmith, ROADtools, and AADInternals.

    Overview of the Cookie-Bite attack
    Source: Varonis

    Microsoft flagged the researchers’ login attempts in the attack demonstration as “atRisk” due to them using a VPN, so monitoring for abnormal sign-ins is key to preventing these attacks.

    Additionally, it is recommended that conditional access policies (CAP) be enforced to limit logins to specific IP ranges and devices.

    Concerning Chrome extensions, it is recommended that Chrome ADMX policies be enforced to allow only pre-approved extensions to run and block users from the browser’s Developer Mode entirely.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleI’m definitely not ready for LG’s ‘emotionally aware’ TV ads
    Next Article Ex-Meta engineer raises $14M for Lace AI, a revenue generation software startup
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Google links massive cloud outage to API management issue

    June 13, 2025

    The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

    June 11, 2025

    These two Ivanti bugs are allowing hackers to target cloud instances

    May 21, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202525 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202521 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202515 Views

    Arizona moves to ban AI use in reviewing medical claims

    March 12, 202511 Views
    Don't Miss
    Technology June 25, 2025

    The state of DTC marketing in 2025: How brands and agencies are leveraging data and automation to fuel ROI

    The state of DTC marketing in 2025: How brands and agencies are leveraging data and…

    LGBTQ+ publishers grapple with a Pride Month ad spend slowdown

    Why there’s a CPM slump in a growing CTV market

    How TikTok’s ‘The Secret Lives of Mormon Wives’ landed on Hulu, with Select Management Group’s Danielle Pistotnik

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    The state of DTC marketing in 2025: How brands and agencies are leveraging data and automation to fuel ROI

    June 25, 20250 Views

    LGBTQ+ publishers grapple with a Pride Month ad spend slowdown

    June 25, 20250 Views

    Why there’s a CPM slump in a growing CTV market

    June 25, 20250 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.