Saturday, June 14, 2025
Advertisements

ZeroCrumb Malware Found on GitHub Stealing Browser Cookies

by Charline

Cybersecurity researchers have uncovered a new threat named ZeroCrumb, an advanced malware that steals browser cookies and bypasses key security measures. Alarmingly, it was recently distributed through public GitHub repositories.

This malware targets cookies stored in popular browsers like Chrome, Brave, and Edge. These cookies often contain authentication data that allows users to stay logged into websites without re-entering passwords. By stealing them, attackers can hijack active sessions and access sensitive accounts directly.

Advertisements

Why ZeroCrumb Is Dangerous

Unlike many cookie stealers, ZeroCrumb does not require administrative privileges to work. It avoids triggering User Account Control (UAC) warnings, making it harder for users to notice when their systems are compromised.

Advertisements

The malware targets the encrypted storage used by browsers to protect cookies. It extracts authentication tokens that could give attackers access to email accounts, cloud storage, banking services, and corporate systems—all without needing passwords or breaking multi-factor authentication.

Advertisements

Researchers from KrakenLabs discovered the malware after detecting unusual data being sent from several corporate networks. Their findings suggest ZeroCrumb is a major step forward in how attackers steal credentials through browsers.

Advertisements

Wider Implications

With so many people using browser-based apps for work and personal use, stolen cookies can lead to quick and silent account takeovers. This makes ZeroCrumb a major threat to both individuals and businesses.

How It Works

ZeroCrumb uses a method called Transacted Hollowing to pose as a real Chrome browser process. This lets it bypass Chrome’s built-in security system known as the Chrome Elevation Service.

The malware accesses the IElevator COM interface to decrypt something called the App Bound Key, which is needed to unlock encrypted cookies.

It uses named pipes, a type of secure communication channel, to pass data. Any app with access to Windows APIs can connect to the “ZeroCrumb pipe” and extract the decryption key.

In some cases, ZeroCrumb is compiled as a DLL file, with the key dumper hidden in the library’s resource section. This allows attackers to use the malware in different ways, including hiding it in legitimate-looking programs.

Hard to Detect, Easy to Trust

ZeroCrumb is hard to detect because it mimics real browser processes while stealing data in the background. Its stealthy behavior makes it especially risky in corporate environments where trusted systems and applications are common.

Advertisements

You may also like

blank

At ProxyServerPro, we are dedicated to providing cutting-edge proxy solutions tailored to meet the diverse needs of businesses and individuals. Our platform offers a comprehensive range of high-performance proxies, including residential, datacenter, and mobile options, ensuring seamless browsing, data scraping, and online anonymity. With a focus on reliability, speed, and security, we empower users to navigate the digital landscape with confidence. Whether you’re managing ad verification, market research, or web automation, ProxyServerPro is your trusted partner for scalable, efficient, and secure proxy services. Explore our portal to discover how we can elevate your online experience.

© 2024 Copyright  proxyserverpro.com