The new Storm infostealer malware bypasses passwords and multi-factor authentication by hijacking active session cookies, allowing attackers to access corporate and cryptocurrency accounts without triggering standard security alerts.
Key Points
- Storm malware exfiltrates encrypted browser data to remote servers for processing, effectively evading local endpoint security detection.
- The malware supports both Chromium- and Gecko-based browsers, including Firefox, Waterfox, and Pale Moon.
- Attackers use stolen session tokens combined with proxy servers to mimic victim locations and avoid suspicious login flags.
- The software is sold as a subscription service with pricing ranging from a $300 weekly demo to $1,800 monthly team licenses.
- Varonis Threat Labs identified active campaigns targeting major platforms like Google, Facebook, Coinbase, and Binance across multiple global regions.