Not long ago, Google strengthened Chrome with a function designed to protect sensitive data such as cookies and credentials: Application-Bound Encryption (EBA), a layer that keeps the master key encrypted on disk and requires a service with system privileges to decipher it. The idea was to close an access path that information robbers (infostealers) had been exploiting for years. However, security researchers have detected a new actor who has found a different and stealth way to defeat that barrier.
The finding is documented by Gen Digital, the parent company of Norton, Avast, AVG and Avira. His report describes how a malware platform available as a service - known as VoidStealer - incorporated a debugging technique to capture the call v20 _ master _ key directly from the browser memory, at the exact moment it appears in flat text during a legitimate decryption process.

The key novelty is not in the ability to read memory - techniques to extract keys had already been demonstrated in open source tools - but in the form: VoidStealer starts a browser process in a suspended and hidden state, attached it as a debugger and waits for an important module (e.g. chrome.dll or msedge.dll) to load. From there it locates a specific instruction that refers a known text within the DLL and places a hardware interruption point about that address.
A hardware breakpoint is different from the classic methods of code injection or privilege lifting; it acts at the processor level and can temporarily stop the execution of a thread when it reaches a given instruction. VoidStealer applies that mechanism to all the threads of the target process and waits for the marked instruction to be executed during the browser start-up - when it forces the early reading and decryption of protected data. At that moment the malware reads the thread records to get a pointer to the memory block that contains the clear master key and the off-process copy with legitimate system calls like ReadProcessMemory. The result is that without climbing privileges or injecting code, attackers get the key needed to decrypt cookies and other secrets stored by the browser.
According to Gen Digital, this behavior did not come from nothing: the technique has similarities with open source components such asElevationKatz, part of the wholeChromeKatzthat already demonstrated practical weaknesses in Chrome's data protection. The dangerous difference is that this technique has now moved from the laboratory to the criminal market, integrated into a MaaS product that is advertised in clandestine forums since the end of 2025 and that in its version 2.0 added this bypass.
The case highlights an important point of modern security: the mitigations that protect the secrets at rest can be violated at the exact moment when a legitimate application performs legitimate operations to decipher them. The problem is not just the disk encryption, but the control of the processes that make the decipher.. If an attacker can observe these processes from within - even without high privileges - he can capture the keys as soon as they materialize in memory.
Chrome leaders have been deploying corrections and hardships to close known techniques, and the EBA concept itself was a step forward against trivial attacks. However, the emergence of purification-based vectors and breakpoint hardware shows that the game of the cat and mouse continues: defenders cover holes, researchers publish concept tests, and criminals sometimes integrate these tests into commercial tools.

For users and security equipment this has several practical implications. First, keeping the browser and operating system up to date remains the first line of defense, because many patches include hardening against process handling techniques. Secondly, the detection of activities that attempt to list, attach or purify legitimate processes should be part of the endpoint set of controls; hardware interruption points are more difficult to detect than injection techniques, but not impossible for advanced EDR solutions and system integrity policies. Finally, limiting the execution of unknown binaries and applying less privileged principle measures reduces exposure to such threats.
If you want to read the technical analysis that led to this news, Gen Digital published a report describing the chain of events and the logic of the attacker: Gen Digital report on VoidStealer. To see the open source piece that inspired the technique, the ChromeKatz project and its ElevationKatz component are available in GitHub: ChromeKatz repository. It may also be useful to consult the official notes of the Chrome versions in which EBA-related security improvements were introduced, available on the Google version blog: Chrome Releases.
The final message is sober: the defenses applied to the safe storage of secrets are necessary but not sufficient on their own. The attacks that observe and take advantage of legitimate times of prosecution demand a defense that combines constant patching, behavior monitoring and strict execution controls. And as researchers continue to publish techniques and concept tests, browser developers and security teams will have to adapt their strategies to make those exposure times more and more difficult to exploit.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...