Stolen session cookies give hackers full account access for less than a thousand dollars a month without triggering alerts


  • Storm enables session hijacking that bypasses passwords and multi-factor authentication
  • Attackers can restore stolen sessions remotely without triggering standard security alerts
  • Malware works server-side to process encrypted browser credentials for stealth exploitation.

A new strain of infostealer malware called Storm is changing the way account compromise works, experts have warned.

New findings from Varonis Threat Labs have shown how this strain is moving away from passwords and focusing on session cookies that keep users logged in.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top