Saturday, June 14, 2025
Advertisements

93+ Billion Stolen Browser Cookies Circulate on Dark Web

by Charline

Cybersecurity researchers have uncovered a large-scale operation involving over 93.7 billion stolen browser cookies circulating on dark web marketplaces — a 74% surge compared to last year’s findings.

The report, released by NordStellar, reveals that more than 15.6 billion of these stolen cookies are still active. The breach spans 253 countries and territories, posing serious risks to millions of users.

Advertisements

Malware Behind the Cookie Theft

The research attributes the bulk of this breach to powerful information-stealing malware programs.

Advertisements
  • Redline Stealer: Collected nearly 42 billion cookies, with 6.2% still active.
  • Vidar: Harvested 10.5 billion cookies, 7.2% remain active.
  • LummaC2: Extracted over 8.8 billion cookies, 6.5% are active.
  • CryptBot: Though responsible for only 1.4 billion cookies, 83.4% remain active, making it the most efficient stealer.

These tools scan browsers for stored session data using methods like document.cookie.split(';'), then send the data to command-and-control servers. Stolen cookies often appear for sale on dark web forums within minutes.

Advertisements

Authentication Risks and Data Labels

The compromised cookies contain sensitive information that can be used to hijack sessions and bypass traditional login security. Analysts found:

Advertisements
  • 18 billion cookies labeled with “ID”
  • 1.2 billion marked “session”
  • 272.9 million tagged “auth”
  • 61.2 million labeled “login”

Attackers can reuse valid Set-Cookie headers to gain access to accounts without passwords or multi-factor authentication.

Targeted Platforms and Services

Google services were the most affected, with over 4.5 billion cookies linked to Gmail, Google Drive, and related platforms. YouTube and Microsoft services also faced heavy exposure, with each accounting for more than 1 billion cookies.

Advanced malware like Rhadamanthys now uses AI-powered optical character recognition (OCR) to extract cryptocurrency seed phrases from images found on infected systems.

Global Impact

Most attacks targeted Windows systems, which accounted for 85.9% of the stolen cookies. Another 13.2 billion cookies were taken from other or unidentified platforms.

Among the most affected countries are Brazil, India, Indonesia, and the United States. In Europe, Spain reported 1.75 billion stolen cookies, while the UK recorded 800 million with an 8.3% active rate—raising particular concern among analysts.

Delivery Methods and Recommendations

Hackers disguise their malware as legitimate downloads, frequently using Microsoft Software Installer (MSI) files or bundling it with pirated software to evade detection.

Security experts advise organizations and individuals to take the following precautions:

  • Clear browser cookies regularly
  • Use updated endpoint detection and response tools
  • Avoid downloading software from untrusted sources
  • Provide continuous security awareness training

The volume and persistence of active stolen cookies underscore the urgent need for better browser security practices and user education to counter this expanding threat.

Advertisements

You may also like

blank

At ProxyServerPro, we are dedicated to providing cutting-edge proxy solutions tailored to meet the diverse needs of businesses and individuals. Our platform offers a comprehensive range of high-performance proxies, including residential, datacenter, and mobile options, ensuring seamless browsing, data scraping, and online anonymity. With a focus on reliability, speed, and security, we empower users to navigate the digital landscape with confidence. Whether you’re managing ad verification, market research, or web automation, ProxyServerPro is your trusted partner for scalable, efficient, and secure proxy services. Explore our portal to discover how we can elevate your online experience.

© 2024 Copyright  proxyserverpro.com