Stolen session cookies give hackers full account access for less than a thousand dollars a month without generating alerts.


  • Storm enables session hijacking that bypasses passwords and multi-factor authentication
  • Attackers can restore stolen sessions remotely without triggering standard security alerts
  • Malware operates on the server side to process encrypted browser credentials for stealthy exploitation

Experts have warned that a new strain of data-stealing malware called Storm is changing the way account compromise works.

New findings from Varonis Threat Labs have described how this strain moves away from passwords and focuses on session cookies that keep users logged in.



Leave a Comment

Your email address will not be published. Required fields are marked *