← Back to posts

How VoidStealer is Bypassing Google Chrome’s Security & Entering Your Server

By Harsh Nandanwar

New “VoidStealer” Malware is-to-be Your System by Bypassing Chrome’s Security

Think about how much of your life lives inside your web browser. With a single click, Google Chrome logs you into your bank, your email, your social media, and your favorite online stores. It does this using a combination of saved passwords and “cookies” (tiny files that remember you are logged in).

Because this data is so valuable, Google has spent years building digital walls to protect it. But in the ever-evolving world of cybersecurity, whenever a taller wall is built, hackers build a longer ladder.

What is VoidStealer in Cybersecurity

Enter VoidStealer, a highly sophisticated piece of malware recently analyzed by the security researchers at Gen Digital (the parent company of Norton, Avast, and AVG). VoidStealer has figured out a stealthy, near-invisible way to bypass Chrome’s strongest security measures and steal the “master key” to your digital life.

If you aren't a cybersecurity expert, the technical reports can sound like a foreign language. Here is a detailed, easy-to-understand breakdown of what VoidStealer is, how it pulls off this incredible digital heist, and exactly what you need to do to protect yourself.

The Vault: Chrome’s “Application-Bound Encryption”

To understand the heist, you first need to understand the vault.

In June 2024, Google introduced a massive security upgrade to Chrome called Application-Bound Encryption (ABE). Before ABE, your saved passwords and cookies were encrypted (scrambled so they couldn't be read), but malware could sometimes trick your computer into unscrambling them.

ABE changed the rules. It created a system where the “master key” used to lock and unlock your data was guarded by the highest, most privileged level of your computer's operating system (called the SYSTEM level). Regular malware were completely locked out. Think of ABE as a bank vault that can only be opened if the Bank Manager is physically present to turn the dial.

For a while, this stopped hackers dead in their tracks. But the creators of VoidStealer found a loophole.

How a Malware Can Bypass Google’s Security: VoidStealer Freezes Time

VoidStealer doesn’t try to break the ABE bank vault. It knows it isn't strong enough to do that. Instead, it uses a trick that experts call a “hardware breakpoint.” Here is how the heist goes down, step-by-step:

  1. The Hidden Ghost: When VoidStealer infects a computer, it quietly launches a hidden, suspended version of your browser. (Note: This attack works on the core files of both Google Chrome and Microsoft Edge).
  2. The Tripwire: VoidStealer acts like a mechanic attaching diagnostic tools to an engine. It sets a microscopic “tripwire” inside the browser's code, waiting for a very specific moment.
  3. The Split-Second Theft: When you open your browser to go online, Chrome has to briefly take the master key out of the vault to unscramble your saved cookies and log you into your websites. In that exact fraction of a second—when the key is sitting in the computer’s temporary memory—the tripwire triggers.
  4. The Getaway: VoidStealer snaps a digital copy of the master key and vanishes. Because it never tried to break the vault, and because it used built-in computer diagnostic tools to do it, no security alarms sound.

With that copied master key, hackers can now quietly unlock and read all the sensitive data your browser has saved.

The Plot Twist: Hackers Copied the Homework to Get Your Chrome

One of the most fascinating details from the Gen Digital report is that the criminals behind VoidStealer likely didn't even invent this genius trick.

In the cybersecurity world, “good guy” researchers often build open-source tools to test software for weaknesses. Over a year ago, researchers created a testing tool called ElevationKatz to demonstrate that Chrome’s master key might be vulnerable for a split second. The creators of VoidStealer simply looked at that public research, copied the code, and weaponized it.

The Business of Cybercrime: Malware-as-a-Service

Perhaps the scariest part of VoidStealer is how it is distributed. This isn't the work of a lone hacker in a basement targeting you specifically.

VoidStealer is a Malware-as-a-Service (MaaS). This means the developers treat their malware like a legitimate software subscription. Since late 2025, they have been advertising VoidStealer on dark web forums. Other cybercriminals simply pay a monthly fee to “rent” the software. The renters trick people into downloading the malware, and the VoidStealer platform handles the complex job of stealing the master keys and delivering the stolen data.

How to Protect Your Digital Life

Hearing about invisible tripwires and dark web subscriptions is terrifying, but you are not helpless. Because VoidStealer relies on stealing your browser's specific master key, you can take steps to make its job much harder, if not impossible.

Securing Your Data from Malwares and Cybersecurity Attacks

1. Don't Invite the Vampire In: VoidStealer cannot infect your computer by magic. It is usually hidden inside fake software updates, pirated video games, or malicious email attachments. Only download software from official, verified websites.

2. Move Your Passwords: Browser-based password managers are convenient, but they put all your eggs in one basket. Switch to a dedicated, third-party password manager (like Bitwarden, 1Password, or Dashlane). These apps use their own separate, heavy-duty encryption that VoidStealer’s Chrome trick cannot touch.

3. Keep Your Browser Updated: This is a game of cat-and-mouse. Now that Google knows exactly how VoidStealer operates, their engineers are likely working on an update to patch this vulnerability. Whenever Chrome or Edge asks you to restart to apply an update, do it immediately.

4. Run a Trusted Antivirus: A robust security suite (like Norton, Bitdefender, or Malwarebytes) looks for the behavior of malware. Even if a virus is brand new, a good antivirus can often detect when a program is trying to secretly launch a hidden browser or set a suspicious “tripwire” and stop it before the heist begins.

5. Clear Your Cookies: Make it a habit to clear your browser cookies every few weeks. It’s slightly annoying to have to log back into your favorite sites, but it drastically reduces the amount of sensitive data sitting around waiting to be stolen.

The Bottom Line: Don't Be an Easy Target

Cybersecurity often feels like an endless arms race between tech giants and invisible criminals, leaving everyday users caught in the crossfire. But as sophisticated as VoidStealer sounds with its “memory extraction” and hidden tripwires, its success still relies on the basics: an outdated browser, a missing antivirus, or a single careless click on a bad download.

You don't need a computer science degree to outsmart malware like this. By taking ten minutes today to update Google Chrome, clear your old cookies, and set up a dedicated password manager, you are effectively locking the digital vault and taking the master key with you. Cybercriminals are ultimately looking for the path of least resistance, a few simple, proactive habits are all it takes to make sure you aren't an easy target.

They target websites that are easier and don’t have any protocol to identify a cybersecurity threat. It affects your customers’ experience, and they think of your business in a bad manner. Such exploits in your system ruin your reputation and your hard work. This is why it is necessary to audit your website and perform a cybersecurity scan that can detect up to 7500 vulnerabilities. Check out Axeploit’s blog for such valuable resources.

Integrate Axe:ploit into your workflow today!