Stolen session cookies give hackers full account access for under a thousand dollars a month without raising alerts


  • Storm enables session hijacking that bypasses passwords and multi-factor authentication
  • Attackers can recover stolen sessions remotely without triggering standard security warnings
  • Malware operates on the server side to process encrypted browser credentials for stealthy exploitation

A new strain of infostealer malware called Storm is changing how account compromise works, experts have warned.

New findings from Varonis Threat Labs have outlined how this strain is moving away from passwords and focusing on session cookies that keep users logged in.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top