Google’s AppBound Cookie Encryption was introduced in July 2024 to enhance cookie security in Chrome, requiring malware to operate with elevated privileges for cookie theft. However, research revealed vulnerabilities that allow low-privileged malware to exploit the system, including COM hijacking and the development of a tool called C4 (Chrome Cookie Cipher Cracker) to bypass these protections. The findings emphasize the ongoing battle between security advancements and malware adaptation.
Browser cache smuggling is a technique that malicious actors can exploit to deliver malware by hiding it in the browser's cache, allowing for less suspicious downloads. The article explores methods for executing cached DLLs and shellcode through COM hijacking and steganography, ultimately demonstrating a way to maintain persistence within the Chrome browser environment. The author highlights the effectiveness of this approach in evading detection by modern endpoint detection and response (EDR) solutions.