Read Time:1 Minute, 50 Second

Bypassing the perimeter is the new hotness in cybercrime, and cookies are the key. Here is how it works: hackers use a phishing attack to steal your cookies, then use those cookies to log in to your account and wreak havoc.

It is a simple attack that can have devastating consequences—and it’s on the rise.

Sean Gallagher of Sophos released a report in August about how cookie stealing has become a new method for perimeter bypass. The report, titled “Cookie Stealing: The New Perimeter Bypass,” details how the attack works and how it’s being used to target businesses. Sophos documented that cookie theft is becoming a popular method for hackers to bypass traditional perimeter security and gain access to corporate networks.

“Attackers are increasingly turning to steal the “cookies” associated with credentials to clone active or recent web sessions—bypassing MFA in the process,” notes Gallagher in the report. 

This method has created a new attack surface for cybercriminals to exploit. In a cookie theft attack, hackers use phishing or other methods to steal a user’s cookies. They then use those cookies to log in to the account, access sensitive information, or perform other malicious actions.

“Because the attacker is using the victim’s credentials, they can often avoid detection by traditional security measures,” the report explains. “This makes cookie theft a powerful tool for bypassing the perimeter.”

According to the report, the cyber threat landscape has become more dynamic as ransomware groups come and go. The attacks are also becoming more sophisticated, with hackers using stolen cookies to access corporate networks, launch ransomware attacks, and steal sensitive data.

“Cookie theft is a serious threat to businesses of all sizes,” the report emphasised. “It is important to be aware of the risk and take steps to protect your network.”

The report provides a few recommendations for businesses, including:

  • Educate employees about the dangers of cookies and phishing emails
  • Use two-factor authentication
  • Implement a cookie policy that restricts access to sensitive information
  • Monitor network traffic for suspicious activity
  • Deploy advanced security measures, such as intrusion detection and prevention systems

“By following these recommendations, businesses can help mitigate the risk of cookie theft and other cyber threats,” the report concludes.

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
crypto startup Previous post Crypto Startup Nomad Loses $190 Million to Hackers, Offers 10% Bounty for Return of Funds
Xiaomi Mobile Payment Next post Check Point Research Reveals Xiaomi Mobile Payment Vulnerabilities, Xiaomi Fixes Issues