{"id":30546,"date":"2026-05-06T12:53:46","date_gmt":"2026-05-06T11:53:46","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/?p=30546"},"modified":"2026-05-06T12:53:46","modified_gmt":"2026-05-06T11:53:46","slug":"chrome-application-bound-encryption-bypass-voidstealer","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/chrome-application-bound-encryption-bypass-voidstealer\/30546\/","title":{"rendered":"New VoidStealer Trojan bypasses Chrome&#8217;s stored data protection"},"content":{"rendered":"<p>Malicious actors have developed a new way to steal data stored by Chrome for Windows. Researchers discovered the technique while analyzing a fresh build of an infostealer known as VoidStealer. The new method allows the malware to bypass Chrome\u2019s Application-Bound (App-Bound) Encryption (ABE), a mechanism intended to protect <a href=\"https:\/\/www.kaspersky.com\/blog\/types-of-cookie-files-and-how-to-protect-them\/54243\/\" target=\"_blank\" rel=\"noopener nofollow\">session cookies<\/a> and other valuable information stored in the browser.<\/p>\n<p>Google hoped this mechanism would secure the master key Chrome uses to encrypt all sensitive data. Unfortunately, this isn\u2019t the first time malware authors have found a workaround for this defense \u2014 leaving secrets stored in Chrome vulnerable once again.<\/p>\n<h2>How App-Bound Encryption works in Chrome<\/h2>\n<p>Google <a href=\"https:\/\/security.googleblog.com\/2024\/07\/improving-security-of-chrome-cookies-on.html\" target=\"_blank\" rel=\"noopener nofollow\">introduced<\/a> App-Bound Encryption in July 2024 with the release of Chrome version 127. The company\u2019s announcement mentioned infostealers snatching cookies from Chrome users on Windows as the primary problem ABE was intended to solve. We\u2019ve already covered in detail what these files are and the <a href=\"https:\/\/www.kaspersky.com\/blog\/types-of-cookie-files-and-how-to-protect-them\/54243\/\" target=\"_blank\" rel=\"noopener nofollow\">consequences of their theft<\/a>, so we\u2019ll only briefly recap the main facts here.<\/p>\n<p>Cookies are small files that the browser saves to the user\u2019s device at a website\u2019s request to remember various site settings. Of particular value to attackers are session cookies, which are used for automatic authentication on websites. It\u2019s thanks to these files that we don\u2019t have to enter a username and password every time we revisit a site.<\/p>\n<p>But this convenience carries a risk: stealing these files allows an attacker to use an already-authenticated session without entering a username or password. This allows them to impersonate the user, which can lead to account hijacking, theft of personal or financial data, and other adverse consequences.<\/p>\n<p>Infostealer Trojans are particularly dangerous for Chrome users on Windows. This is because, on this OS, Chrome previously relied solely on the standard built-in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Data_Protection_API\" target=\"_blank\" rel=\"noopener nofollow\">Data Protection API (DPAPI)<\/a>. With this system encryption mechanism, applications don\u2019t need to create and store encryption keys to protect data.<\/p>\n<p>The limitation of DPAPI is that it doesn\u2019t protect data from malware that\u2019s already successfully compromised the system and is capable of executing code on behalf of the logged-in user. This is exactly what stealers exploit: since they typically run with the user\u2019s privileges, they can simply request DPAPI to decrypt the browser\u2019s protected data.<\/p>\n<p>The ABE mechanism was designed to solve that specific problem. The core idea is right in the name: App-Bound Encryption means the encryption is tied to a specific application. To achieve this, a separate service running with system privileges is responsible for protecting the key used to encrypt Chrome\u2019s data. It verifies which application is requesting access to the key, and denies the request if it doesn\u2019t originate from Chrome.<\/p>\n<div id=\"attachment_55738\" style=\"width: 1426px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2026\/05\/06124422\/chrome-application-bound-encryption-bypass-voidstealer-01.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55738\" class=\"wp-image-55738 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2026\/05\/06124422\/chrome-application-bound-encryption-bypass-voidstealer-01.png\" alt=\"How Chrome's App-Bound Encryption (ABE) works \" width=\"1416\" height=\"919\"><\/a><p id=\"caption-attachment-55738\" class=\"wp-caption-text\">Chrome\u2019s App-Bound Encryption (ABE) was designed so that only Chrome itself could retrieve the master key needed to decrypt the browser\u2019s stored data. <a href=\"https:\/\/security.googleblog.com\/2024\/07\/improving-security-of-chrome-cookies-on.html\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>As a result, the architects of this feature assumed that to access ABE-protected browser data, an infostealer would either need to escalate its privileges to system-level, or inject malicious code directly into Chrome. In theory, this should have made attacking Chrome significantly harder and reduced the effectiveness of mass-market infostealers. As you might have guessed, things didn\u2019t go quite that smoothly in practice.<\/p>\n<h2>Previous successful bypasses of Chrome\u2019s ABE<\/h2>\n<p>Just a couple of months after Google announced the implementation of App-Bound Encryption in Chrome, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/infostealer-malware-bypasses-chromes-new-cookie-theft-defenses\/\" target=\"_blank\" rel=\"noopener nofollow\">many infostealer developers<\/a> claimed they\u2019d already bypassed the protection. Among them were the creators of Meduza Stealer, Whitesnake, Lumma Stealer, and Lumar (also known as PovertyStealer).<\/p>\n<div id=\"attachment_55740\" style=\"width: 526px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2026\/05\/06124427\/chrome-application-bound-encryption-bypass-voidstealer-02-EN.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55740\" class=\"wp-image-55740 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2026\/05\/06124427\/chrome-application-bound-encryption-bypass-voidstealer-02-EN.jpg\" alt=\"Announcement of a new version of the Lumma stealer \" width=\"516\" height=\"540\"><\/a><p id=\"caption-attachment-55740\" class=\"wp-caption-text\">Lumma stealer developers announce a bypass for Chrome\u2019s App-Bound Encryption in a new version of the malware<\/p><\/div>\n<p>Of course, you shouldn\u2019t take malware developers at their word, but legitimate security researchers were able to confirm at least some of the claims. Bypasses for Google Chrome\u2019s new data protection feature did become available almost immediately after its release.<\/p>\n<p>A month later, in October 2024, tech enthusiast Alex Hagenah published a tool on GitHub called <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-tool-bypasses-google-chromes-new-cookie-encryption-system\/\" target=\"_blank\" rel=\"noopener nofollow\">Chrome-App-Bound-Encryption-Decryption<\/a> to bypass Google\u2019s new security mechanism. Analysis of the tool\u2019s code revealed that its author used roughly the same methods that attackers were already heavily exploiting.<\/p>\n<p>What followed was a game of cat and mouse: <a href=\"https:\/\/cyberpress.org\/c4-bomb-exploit-breaks-chrome-app-bound-cookie-encryption-in-the-wild\/\" target=\"_blank\" rel=\"noopener nofollow\">security researchers<\/a> and <a href=\"https:\/\/thehackernews.com\/2025\/05\/eddiestealer-malware-uses-clickfix.html\" target=\"_blank\" rel=\"noopener nofollow\">stealer developers<\/a> came up with new tricks to circumvent App-Bound Encryption, while Google patched the newly discovered loopholes with varying degrees of success.<\/p>\n<h2>VoidStealer \u2014 a new data-nabbing menace<\/h2>\n<p>This brings us to recent events: in March 2026, news broke about a stealer named <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/voidstealer-malware-steals-chrome-master-key-via-debugger-trick\/\" target=\"_blank\" rel=\"noopener nofollow\">VoidStealer<\/a>, which utilizes a brand-new and, by all accounts, highly effective method for bypassing ABE.<\/p>\n<div id=\"attachment_55741\" style=\"width: 1180px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2026\/05\/06124431\/chrome-application-bound-encryption-bypass-voidstealer-03.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-55741\" class=\"wp-image-55741 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2026\/05\/06124431\/chrome-application-bound-encryption-bypass-voidstealer-03.jpg\" alt=\"Announcement of a new VoidStealer version \" width=\"1170\" height=\"361\"><\/a><p id=\"caption-attachment-55741\" class=\"wp-caption-text\">VoidStealer developers advertising a new method for bypassing ABE. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/voidstealer-malware-steals-chrome-master-key-via-debugger-trick\/\" target=\"_blank\" rel=\"nofollow noopener\"> Source <\/a><\/p><\/div>\n<p>The malware authors developed an attack technique that targets the brief moment when the master key sits in the browser\u2019s memory in plaintext. This occurs because, at a certain point, the browser inevitably has to decrypt its data to actually use it \u2014 for instance, to automatically sign in to a website with the relevant session cookie or to access saved credentials.<\/p>\n<p>To exploit this window of opportunity, the malware attaches itself to the Chrome process as a debugger \u2014 a tool that allows one to control a program\u2019s execution, pause it, and inspect its memory. In legitimate scenarios, these tools are used by developers to find and fix bugs, analyze application behavior, and test performance.<\/p>\n<p>The malware identifies the specific section of code where data decryption takes place. It then sets a breakpoint at that location; when the program\u2019s execution reaches that point, the browser effectively freezes. This is how the malware catches the exact moment the master key is sitting in RAM in plaintext; it then reads the key directly from memory.<\/p>\n<p>It\u2019s worth noting that everything mentioned above also applies to other Chromium-based browsers that use ABE, including Microsoft Edge, Brave, Opera, Vivaldi, and others.<\/p>\n<h2>How to avoid falling victim to infostealers<\/h2>\n<p>The scale of VoidStealer\u2019s reach could be significant, as its developers operate under the malware-as-a-service (MaaS) model. This means they rent out the ready-made tool to other attackers, so they don\u2019t need to develop custom malware from scratch.<\/p>\n<p>This situation demonstrates that relying solely on built-in security mechanisms isn\u2019t enough. Unfortunately, stealer developers are coming up with new workarounds faster than browser and operating system developers can roll out patches.<\/p>\n<p>Here\u2019s what users can do about it:<\/p>\n<ul>\n<li>Avoid installing programs from suspicious sources. This will minimize the chances of malware infiltrating your system.<\/li>\n<li>Learn how <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-clickfix\/53348\/\" target=\"_blank\" rel=\"noopener nofollow\">ClickFix attacks<\/a> Lately, stealers have frequently been distributed using this specific malicious tactic.<\/li>\n<li>Keep your OS and software updated on all devices. Timely updates help patch many of the vulnerabilities that malware exploits.<\/li>\n<li>Install a <a href=\"https:\/\/www.kaspersky.co.uk\/premium?icid=gb_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">robust security solution<\/a> on all your devices. It\u2019ll block suspicious activity in real time and alert you to potential threats.<\/li>\n<\/ul>\n<p>As an added precaution, avoid storing passwords and bank card info in Google Chrome or your Notes app, as these are the first places any self-respecting stealer looks. Instead, use a secure <a href=\"https:\/\/www.kaspersky.co.uk\/password-manager?icid=gb_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a>.<\/p>\n<blockquote><p>Stealers are hunting for your data, finding ways to infiltrate both computers and smartphones alike. To protect yourself from theft, check out our other related posts:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ios-macos-fake-crypto-apps\/55665\/\" target=\"_blank\" rel=\"noopener nofollow\">Crypto thieves ramping up attacks on Apple users<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/prankware-crystalx-rat-maas\/55537\/\" target=\"_blank\" rel=\"noopener nofollow\">CrystalX RAT can flip your screen and steal your crypto<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/55401\/\" target=\"_blank\" rel=\"noopener nofollow\">Android Trojan posing as government services and Starlink apps<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/windows-stealer-stealka\/55058\/\" target=\"_blank\" rel=\"noopener nofollow\">Stealka stealer: the new face of game cheats, mods, and cracks<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ios-android-stealer-sparkkitty\/53675\/\" target=\"_blank\" rel=\"noopener nofollow\">Your cat pics are at risk: the threat posed by the new SparkKitty Trojan<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>The new VoidStealer Trojan utilizes a novel method to bypass Chrome&#8217;s App-Bound Encryption, allowing it to hijack sessions and steal user data.<\/p>\n","protected":false},"author":2726,"featured_media":30551,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026],"tags":[2106,16,404,2024,261,22,38,2554,97,2569,529,698,113],"class_list":{"0":"post-30546","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-browsers","9":"tag-chrome","10":"tag-cookies","11":"tag-edge","12":"tag-encryption","13":"tag-google","14":"tag-microsoft","15":"tag-opera","16":"tag-security-2","17":"tag-stealers","18":"tag-threats","19":"tag-trojans","20":"tag-windows"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/chrome-application-bound-encryption-bypass-voidstealer\/30546\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/chrome-application-bound-encryption-bypass-voidstealer\/30695\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/chrome-application-bound-encryption-bypass-voidstealer\/25747\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/chrome-application-bound-encryption-bypass-voidstealer\/41806\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/chrome-application-bound-encryption-bypass-voidstealer\/55735\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/chrome-application-bound-encryption-bypass-voidstealer\/30630\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/chrome-application-bound-encryption-bypass-voidstealer\/36204\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/chrome-application-bound-encryption-bypass-voidstealer\/36097\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/stealers\/","name":"stealers"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/30546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=30546"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/30546\/revisions"}],"predecessor-version":[{"id":30550,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/30546\/revisions\/30550"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/30551"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=30546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=30546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=30546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}