session hijacking

AppWizard
April 25, 2026
McAfee researchers discovered a complex Android rootkit campaign, dubbed Operation NoVoice, that infiltrated 50 applications on Google Play, exploiting vulnerabilities in the kernel that had been patched but not uninstalled. The malware was resilient enough to survive factory resets and was concealed within seemingly benign apps, which collectively garnered 2.3 million downloads. The malicious payload was hidden in the com.facebook.utils package and used steganography to embed an encrypted payload within a PNG image. The malware conducted multiple checks to avoid detection and established contact with a command-and-control server, polling for exploit packages every 60 seconds. It utilized 22 distinct exploits, including vulnerabilities that had received patches between 2016 and 2021. The malware disabled SELinux enforcement and installed a persistent rootkit that could survive factory resets. Google confirmed the removal of the infected apps but noted that users who had already downloaded them remained at risk, especially if their devices were running unpatched Android versions. McAfee advised affected users to treat their devices as compromised and consider professional inspection or hardware-level storage wiping for remediation.
Tech Optimizer
November 7, 2025
A banking trojan named Herodotus targets Android users globally, operating as Malware-as-a-Service and disguising itself as a legitimate app to lure users into downloading an APK from unofficial sources. Once installed, it gains critical system permissions to perform banking operations on behalf of the user. The malware is primarily distributed through SMS phishing campaigns that lead victims to fraudulent download pages. Herodotus employs overlay attacks to steal credentials and hijack sessions, posing a significant threat to financial security. It uses advanced evasion tactics, including random delays and realistic typing patterns, to avoid detection by traditional antivirus solutions. The trojan captures screen content and keystrokes, allowing real-time monitoring of user activity. Detection is complicated as Herodotus circumvents defenses by installing from unknown sources and executing harmful actions only after obtaining user permissions. Effective defense requires recognizing multiple indicators of compromise, such as suspicious SMS links and behavioral anomalies, which traditional antivirus protection often overlooks.
Tech Optimizer
October 4, 2024
Session hijacking has evolved to bypass multi-factor authentication (MFA) checks, with Microsoft reporting 147,000 token replay attacks in 2023, a 111% increase from the previous year. Google noted that session cookie attacks now rival traditional password-focused cyberattacks. Modern session hijacking techniques include Adversary-in-the-Middle (AitM) attacks, Browser-in-the-Middle (BitM) attacks, and infostealers. Infostealers can target all session cookies and credentials stored in a user's browser and were responsible for 43% of malware detected in 2023, according to the 2024 Sophos Threat Report. Advanced malware can evade detection by Endpoint Detection and Response (EDR) systems. Effective prevention measures include keeping personal information private, using robust antivirus and EDR solutions, and implementing strong in-app controls.
Search