A new information‑stealing malware called VoidStealer has introduced a stealthy method to bypass Google Chrome’s Application‑Bound Encryption (ABE), extracting the browser’s master key directly from memory. This marks the first time an infostealer has been observed in the wild using hardware breakpoints to defeat Chrome’s protections.
Background: Chrome’s ABE
- Introduced in Chrome 127 (June 2024).
- Designed to protect cookies and sensitive browser data by keeping the master key encrypted on disk.
- Decryption requires the Chrome Elevation Service, running as SYSTEM, to validate requests.
- Goal: prevent malware from simply dumping keys from user‑level access.
VoidStealer’s Technique
- Debugger‑based bypass: Starts a hidden browser process and attaches as a debugger.
- Targeting DLLs: Waits for
chrome.dllormsedge.dllto load, then scans for a specific string and instruction. - Hardware breakpoints: Sets breakpoints across threads to trigger during startup.
- Extraction: Reads the register pointing to the plaintext
v20_master_keyusingReadProcessMemory. - Timing: Exploits the brief moment during browser startup when cookies are decrypted.
This approach avoids privilege escalation or code injection, making it stealthier than previous bypasses.
Malware Context
- VoidStealer: Malware‑as‑a‑Service (MaaS), advertised on dark web forums since December 2025.
- Version 2.0: Introduced the debugger‑based bypass.
- Likely origin: Technique adapted from the open‑source ElevationKatz project, part of the ChromeKatz toolset.
Defensive Recommendations
- Update browsers: Ensure Chrome and Edge are running the latest patched versions.
- Monitor startup anomalies: Watch for hidden or suspended browser processes.
- Restrict debugger access: Harden systems against unauthorized debugging tools.
- Endpoint detection: Deploy EDR solutions capable of spotting memory manipulation and unusual breakpoint activity.
- User awareness: Infostealers often arrive via phishing or cracked software — prevention starts with safe practices.
Final Thought
VoidStealer highlights the cat‑and‑mouse dynamic of browser security. Even as Google strengthens protections with ABE, attackers innovate new bypasses. The lesson for defenders is clear: security must extend beyond patching to include behavioral monitoring and layered defenses against stealthy memory‑based attacks.
Leave a Reply