Vojtěch Krejsa, the risk researcher at Gen who first flagged the stealer, calls VoidStealer’s bypass non-noisy. “The bypass requires neither privilege escalation nor code injection, making it a stealthier method in comparison with different ABE bypass strategies,” he mentioned in a weblog put up.
Chasing the grasp key
An ABE bypass revolves round a vital piece of fabric, the “v20_master-key.” This key’s what in the end unlocks saved browser secrets and techniques, together with cookies, passwords, and tokens, as soon as the browser has verified the request. In principle, ABE retains this key tightly guarded, guaranteeing it’s by no means uncovered in a approach that malware can simply entry it.
Nevertheless, in apply, that key nonetheless has to exist in plaintext at runtime, if solely briefly, for Chrome to do its job.
Earlier bypass methods discovered methods to go after decryption, some counting on course of injection that concerned slipping malicious code into Chrome to invoke a reputable decryption routine. Others used reminiscence dumping or distant debugging, scanning giant chunks of course of reminiscence to find decrypted knowledge. Extra superior approaches abused Chrome’s elevation service or COM interfaces to trick the browser into handing over decrypted materials.



