New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

New 'Sryxen' Stealer Bypasses Chrome Encryption via Headless Browser Technique

New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

A new information stealer called Sryxen has emerged in the underground malware market, targeting Windows systems with advanced techniques to harvest browser credentials and sensitive data.

Sold as Malware-as-a-Service, this C++ based threat demonstrates how modern stealers are adapting to overcome browser security improvements, particularly Google Chrome’s recently implemented App-Bound Encryption protection.

Sryxen operates as a smash-and-grab credential harvester, designed for quick execution without establishing persistence on infected machines.

The malware targets Chrome version 127 and above, where Google introduced App-Bound Encryption to protect cookies and sensitive browser data.

Instead of attempting to crack this encryption directly, Sryxen takes an innovative approach by launching Chrome in headless mode and using the browser’s own DevTools Protocol to request decrypted cookie data, effectively bypassing the security measure entirely.

Attack Flow (Source - Deceptiq)
Attack Flow (Source – Deceptiq)

DeceptIQ security researchers identified that Sryxen employs multiple layers of protection to avoid detection and analysis.

google

The malware uses Vectored Exception Handling-based code encryption, keeping its main payload encrypted at rest and only decrypting it during execution through exception handling mechanisms.

This technique makes static analysis challenging, as the malicious code appears as garbage data when examined without running it.

Additionally, the stealer implements six separate anti-debug checks, including NtGlobalFlag inspection and PEB analysis, terminating execution if debugging tools are detected.

Chrome Encryption Bypass Mechanism

The most significant innovation in Sryxen is its approach to stealing Chrome cookies protected by App-Bound Encryption.

When the malware detects Chrome version 127 or higher, it abandons traditional database extraction methods. Instead, it terminates any running Chrome processes and relaunches the browser with specific command-line arguments including –headless, –remote-debugging-port, and –user-data-dir parameters.

The DPAPI Chain (Source - Deceptiq)
The DPAPI Chain (Source – Deceptiq)

These flags enable remote debugging capabilities without displaying any visible windows.

Once Chrome launches in this configuration, Sryxen connects to the debugging port via WebSocket and sends a DevTools Protocol command requesting all cookies through the Network.getAllCookies method.

New 'Sryxen' Stealer Bypasses Chrome Encryption via Headless Browser Technique
App-Bound Encryption Bypass (Source – Deceptiq)

Chrome processes this request internally, decrypting the cookies using its own App-Bound Encryption key and returning the plaintext data to the stealer. The decrypted cookies never touch the disk, making file-based monitoring ineffective.

After receiving the data, Sryxen terminates the Chrome process and continues harvesting other browser information, passwords, and cryptocurrency wallet data before compressing everything into an archive and uploading it to a Telegram bot controlled by the attackers using curl commands executed through PowerShell.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

googlenews



Source link