Cybercriminals Exploit Cookies in Rise of Digital Fraud

In today’s rapidly evolving digital landscape, cybersecurity threats loom larger than ever. Simon Glairy, a distinguished expert in insurance and Insurtech, with keen insights into risk management and AI-driven risk assessments, joins us to discuss the concerning rise of stolen web cookies and other cybersecurity challenges. This interview delves into the mechanics of browser cookies, their exploitation by cybercriminals, and the broader implications on businesses and individuals worldwide.

What are browser cookies, and how are they typically used in online activities?

Browser cookies are small text files stored on your device by websites you visit. They are designed to remember your login credentials, track your browsing behavior, and store user preferences to provide a more personalized experience on subsequent visits. While their core function is to enhance user convenience, they inadvertently become a tool for threat actors when not properly secured.

Why are stolen web cookies becoming a significant threat in cybersecurity?

Stolen cookies are particularly dangerous because they allow cybercriminals to hijack user sessions without the need for login credentials. By intercepting these session data, hackers can gain unauthorized access to accounts, thus facilitating fraud and data breaches on a large scale. The threat grows as more services rely on cookies to maintain session states for user convenience.

According to NordVPN, how many browser cookies have been obtained by threat actors over the past year?

NordVPN reports that over 94 billion browser cookies have been harvested by threat actors in the past year alone. This figure is alarming, representing a dramatic 74% increase compared to the previous period, underscoring the scale at which cybercriminals are operating.

Can you explain how compromised cookies can be used to bypass login credentials?

When a browser cookie is compromised, it can contain unexpired session data. With this data, hackers can effectively impersonate a legitimate user without needing their login credentials. This process is seamless and often goes undetected, as the typical authentication checkpoints are bypassed once the cookie gets hijacked.

Why do cookies pose a direct threat to personal and enterprise accounts?

Cookies can unlock access to sensitive personal and enterprise information stored in online accounts. If a hacker gains access to these cookies, they can penetrate deeper into systems, uncovering confidential data that can be used for identity theft, corporate espionage, or large-scale phishing operations.

How functional are the compromised cookies mentioned in the report, and what does that mean for user accounts?

The report highlights that over 20% of the compromised cookies remain functional. This means that attackers can actively exploit them to gain entry to accounts without arousing suspicion or triggering any authentication alerts, significantly increasing the potential damage that can be done.

Which countries are most affected by cookie theft, and where are the highest rates in Europe?

Countries like Brazil, India, Indonesia, and the US have been the hardest hit by cookie theft. In Europe, Spain and the UK are contending with the highest rates of such incidents, indicating a widespread issue that affects nations globally.

Besides cookies, what other types of sensitive information have been exposed according to the report?

Beyond cookies, the report reveals exposure of sensitive information including 18 billion user-assigned IDs, 1.2 billion session tokens, and various personal identifiers like emails, names, and geolocation data. Such data is incredibly valuable on the black market, feeding into a myriad of identity fraud and social engineering schemes.

How do user-assigned IDs, session tokens, and personal identifiers contribute to cyber threats?

These elements are critical for maintaining secure user sessions and identities online. When exposed, they can be manipulated by cybercriminals to masquerade as legitimate users, facilitating unauthorized access and fraudulent activities across various digital platforms.

What role do malware strains like Redline, Vidar, and LummaC2 play in these breaches?

Malware strains like Redline, Vidar, and LummaC2 have been pivotal in extracting cookies and sensitive information. These sophisticated malware programs specifically target data-rich applications, siphoning off vast amounts of cookies—over 60 billion in this case—contributing heavily to the current wave of cyber breaches.

What are some of the newer malware strains, and how are they engineered to be more effective?

Emerging malware strains such as RisePro and Rhadamanthys have been designed with enhancements to bypass advanced security measures. They employ obfuscation techniques and accelerated data exfiltration processes, making them more elusive and efficient than their predecessors at infiltrating systems.

What consistent findings does the NordVPN report have with Rubrik Zero Labs’ data?

Both the NordVPN and Rubrik Zero Labs findings highlight an alarming frequency of successful cyberattacks, with 90% of surveyed IT professionals acknowledging at least one breach. The parallel data suggest a persistent challenge in effectively combating these intrusions across industries.

How prevalent were successful cyberattacks among security and IT professionals in 2024?

In 2024, an overwhelming 90% of IT and security professionals reported successful cyberattacks, with around 20% experiencing over 24 attacks each within the year. These statistics reflect a critical need for stronger cybersecurity frameworks to mitigate these frequent breaches.

What impact do these cyberattacks have on organizations in terms of spending and reputation?

Cyberattacks force organizations to ramp up their cybersecurity spending, as evidenced by 40% of respondents in the report. Additionally, 37% of organizations suffer reputational damage, which can tarnish their brand and erode customer trust, leading to significant long-term consequences.

What are the most frequently cited attack vectors, and why are stolen credentials a particular concern?

The most common attack vectors include malware, phishing, and cloud vulnerabilities. Stolen credentials are especially concerning due to the ease with which they allow hackers to access systems undetected, potentially escalating to insider threats and adding another layer of complexity for organizations to tackle.

How has leadership turnover been affected in organizations facing cyber breaches?

Organizations experiencing cyber breaches often see leadership turnover, with about a third affected by these issues. The pressure to effectively respond and recover from incidents can lead to shifts in executive roles as companies strive to rebuild and fortify their cybersecurity posture.

What measures do you suggest to mitigate the threats posed by stolen cookies and credentials?

To combat the threat of stolen cookies and credentials, organizations should adopt multi-factor authentication, continuously monitor for suspicious activities, and enforce encryption of sensitive data. Training employees to recognize phishing attempts and simulate responses to data breaches also strengthens their overall cybersecurity readiness. Furthermore, regular audits can identify and address vulnerabilities before they are exploited.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later