{"id":24045,"date":"2026-04-14T16:07:00","date_gmt":"2026-04-14T09:07:00","guid":{"rendered":"https:\/\/fpt-is.com\/en\/?post_type=goc_nhin_so&#038;p=24045"},"modified":"2026-04-14T16:20:35","modified_gmt":"2026-04-14T09:20:35","slug":"no-hacking-or-admin-rights-needed-how-voidstealer-steals-chrome","status":"publish","type":"goc_nhin_so","link":"https:\/\/fpt-is.com\/en\/insights\/no-hacking-or-admin-rights-needed-how-voidstealer-steals-chrome\/","title":{"rendered":"No hacking or admin rights needed: How VoidStealer steals Chrome."},"content":{"rendered":"<h2 id=\"overview\"><span style=\"font-family: arial, helvetica, sans-serif\">Overview<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">VoidStealer is an emerging infostealer, quickly gaining attention in the cybersecurity community for its ability to bypass advanced protection mechanisms of the Chromium browser. Its main targets remain familiar: stealing login information, cookies, and sessions &#8211; but its approach is entirely different. Instead of using traditional techniques like injection or privilege escalation (which are easily detected), VoidStealer employs a more sophisticated approach: exploiting the legitimate debugger mechanism of the operating system to collect data at the moment it is decrypted in memory. Notably, this technique does not break the Application-Bound Encryption (ABE) but &#8220;circumvents&#8221; it &#8211; exploiting the brief moment when data exists in plaintext in RAM. This helps the malware minimize traces, operate more stealthily, and evade detection by security solutions.<\/span><\/p>\n<h2 id=\"what-is-voidstealer\"><span style=\"font-family: arial, helvetica, sans-serif\">What is VoidStealer?<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">VoidStealer is a type of infostealer\u00a0<strong>Malware-as-a-Service (MaaS)<\/strong>\u00a0that emerged in late 2025 and quickly became one of the most notable threats in the cybercrime ecosystem.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/3431e0ca-cc34-4811-a170-1ac4c8867690-1776158074.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24049\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/3431e0ca-cc34-4811-a170-1ac4c8867690-1776158074.png\" alt=\"3431e0ca Cc34 4811 A170 1ac4c8867690 1776158074\" width=\"1170\" height=\"961\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/3431e0ca-cc34-4811-a170-1ac4c8867690-1776158074.png 1170w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/3431e0ca-cc34-4811-a170-1ac4c8867690-1776158074-700x575.png 700w\" sizes=\"(max-width: 1170px) 100vw, 1170px\" \/><\/a><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Initially, VoidStealer was recognized as a &#8220;traditional&#8221; stealer, focusing on collecting data from Chromium browsers like Chrome and Edge. However, in a short time, it was significantly developed with many upgraded versions. Notably,\u00a0<strong>VoidStealer v2 (early 2026)<\/strong>\u00a0marked an important advancement by integrating a technique to bypass\u00a0<strong>Application-Bound Encryption (ABE)<\/strong>\u00a0&#8211; a new protection mechanism designed to prevent browser data theft.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b3a5f93a-5c1a-4ded-9962-058d9c639acf-1776158101.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24050\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b3a5f93a-5c1a-4ded-9962-058d9c639acf-1776158101.png\" alt=\"B3a5f93a 5c1a 4ded 9962 058d9c639acf 1776158101\" width=\"1170\" height=\"361\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b3a5f93a-5c1a-4ded-9962-058d9c639acf-1776158101.png 1170w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b3a5f93a-5c1a-4ded-9962-058d9c639acf-1776158101-700x216.png 700w\" sizes=\"(max-width: 1170px) 100vw, 1170px\" \/><\/a><\/p>\n<h2 id=\"what-is-abe\"><span style=\"font-family: arial, helvetica, sans-serif\">What is ABE?<\/span><\/h2>\n<h3 id=\"what-is-abe-1\"><span style=\"font-family: arial, helvetica, sans-serif\">What is ABE?<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Application-Bound Encryption (ABE) is a data protection mechanism implemented on Chromium browsers (Chrome, Edge, etc.) to prevent the theft of sensitive information like passwords, cookies, and tokens.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Unlike previous mechanisms, ABE not only encrypts data but also ties decryption to the legitimate application itself. Simply put, &#8220;Having the data file doesn&#8217;t mean it can be read&#8221; or &#8220;Decryption requires the correct application and context.&#8221;<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b40330e6-126d-483e-b0e5-c997dc1ef385-1776158170.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24053\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b40330e6-126d-483e-b0e5-c997dc1ef385-1776158170.png\" alt=\"B40330e6 126d 483e B0e5 C997dc1ef385 1776158170\" width=\"1170\" height=\"738\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b40330e6-126d-483e-b0e5-c997dc1ef385-1776158170.png 1170w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b40330e6-126d-483e-b0e5-c997dc1ef385-1776158170-700x442.png 700w\" sizes=\"(max-width: 1170px) 100vw, 1170px\" \/><\/a><\/p>\n<h3 id=\"how-abe-works\"><span style=\"font-family: arial, helvetica, sans-serif\">How ABE Works<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">ABE operates based on three main components: Master Key (v20), Application Binding, and Elevation Service.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Browser data is encrypted using a key called the v20_master_key. This key is not stored in plaintext on disk but is protected by the system.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Additionally, ABE ties decryption to the application identity (Chrome, Edge, etc.) and valid execution context. This prevents external tools from decrypting data and stops malware from directly reading SQLite files.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b79c38c3-c897-4a55-adaa-51beb306bbba-1776158187.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24054\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b79c38c3-c897-4a55-adaa-51beb306bbba-1776158187.png\" alt=\"B79c38c3 C897 4a55 Adaa 51beb306bbba 1776158187\" width=\"1170\" height=\"385\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b79c38c3-c897-4a55-adaa-51beb306bbba-1776158187.png 1170w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/b79c38c3-c897-4a55-adaa-51beb306bbba-1776158187-700x230.png 700w\" sizes=\"(max-width: 1170px) 100vw, 1170px\" \/><\/a><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">To decrypt data, the browser must call a special service (running with elevated privileges). This service checks the caller and only allows valid requests.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/e21dcd48-3124-46a8-83fa-36e88b2a6555-1776158203.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24055\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/e21dcd48-3124-46a8-83fa-36e88b2a6555-1776158203.png\" alt=\"E21dcd48 3124 46a8 83fa 36e88b2a6555 1776158203\" width=\"1170\" height=\"884\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/e21dcd48-3124-46a8-83fa-36e88b2a6555-1776158203.png 1170w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/e21dcd48-3124-46a8-83fa-36e88b2a6555-1776158203-700x529.png 700w\" sizes=\"(max-width: 1170px) 100vw, 1170px\" \/><\/a><\/p>\n<h3 id=\"weakness-exploited-by-voidstealer\"><span style=\"font-family: arial, helvetica, sans-serif\">Weakness (exploited by VoidStealer)<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Despite its outstanding advantages, ABE still has a core weakness: runtime exposure. When the browser is running, data must be decrypted in RAM, meaning the key exists in plaintext (for a short time).<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Additionally, this ABE mechanism does not protect against legitimate debuggers. While ABE secures data during storage, it doesn&#8217;t control processes being debugged. This is the main point exploited by VoidStealer: attach a debugger, wait for the right moment, and extract the key from the register.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/c289c92a-9f3a-4699-9bb8-b2d421e436f3-1776158215.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24056\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/c289c92a-9f3a-4699-9bb8-b2d421e436f3-1776158215.png\" alt=\"C289c92a 9f3a 4699 9bb8 B2d421e436f3 1776158215\" width=\"1170\" height=\"278\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/c289c92a-9f3a-4699-9bb8-b2d421e436f3-1776158215.png 1170w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/c289c92a-9f3a-4699-9bb8-b2d421e436f3-1776158215-700x166.png 700w\" sizes=\"(max-width: 1170px) 100vw, 1170px\" \/><\/a><\/p>\n<h2 id=\"technical-details\"><span style=\"font-family: arial, helvetica, sans-serif\">Technical details<\/span><\/h2>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/34c3e05d-dca2-4519-a8d9-7b7f1e218583-1776158150.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24051\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/34c3e05d-dca2-4519-a8d9-7b7f1e218583-1776158150.png\" alt=\"34c3e05d Dca2 4519 A8d9 7b7f1e218583 1776158150\" width=\"1170\" height=\"706\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/34c3e05d-dca2-4519-a8d9-7b7f1e218583-1776158150.png 1170w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/34c3e05d-dca2-4519-a8d9-7b7f1e218583-1776158150-700x422.png 700w\" sizes=\"(max-width: 1170px) 100vw, 1170px\" \/><\/a><\/p>\n<h3 id=\"the-problem-that-malware-must-solve\"><span style=\"font-family: arial, helvetica, sans-serif\">The problem that malware must solve<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">First, as mentioned, browsers like Chrome or Edge store information such as passwords and cookies, but everything is encrypted using ABE. To read the data, an attacker would need the &#8220;master key&#8221; (v20_master_key). The issue here is that this key is not stored in plaintext and only appears when the browser needs it. This almost renders traditional malware ineffective, but VoidStealer says NO.<\/span><\/p>\n<h3 id=\"voidstealers-incredibly-clever-idea\"><span style=\"font-family: arial, helvetica, sans-serif\">VoidStealer&#8217;s incredibly clever idea<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Instead of trying to crack the code or hack the system, VoidStealer chooses to wait for the browser to decrypt itself and then steal the key. This is the most important idea in the entire technique.<\/span><\/p>\n<h3 id=\"how-voidstealer-works\"><span style=\"font-family: arial, helvetica, sans-serif\">How VoidStealer Works<\/span><\/h3>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/04d19f8b-a0cc-4363-bde7-8a19eb896033-1776158255.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24057\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/04d19f8b-a0cc-4363-bde7-8a19eb896033-1776158255.png\" alt=\"04d19f8b A0cc 4363 Bde7 8a19eb896033 1776158255\" width=\"1565\" height=\"1001\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/04d19f8b-a0cc-4363-bde7-8a19eb896033-1776158255.png 1565w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/04d19f8b-a0cc-4363-bde7-8a19eb896033-1776158255-700x448.png 700w\" sizes=\"(max-width: 1565px) 100vw, 1565px\" \/><\/a><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">First, the malware will open Chrome by itself, but it will hide the window or run in the background so the user doesn&#8217;t notice anything. Next, the malware will attach a debugger to the browser. Since a debugger is a legitimate tool, it can bypass protection mechanisms.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/open-chrome-1776158390.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24059\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/open-chrome-1776158390.png\" alt=\"Open Chrome 1776158390\" width=\"850\" height=\"368\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/open-chrome-1776158390.png 850w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/open-chrome-1776158390-700x303.png 700w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Here, once the malware is dormant in the system, it will watch and wait for Chrome to load data. When Chrome reads cookies or passwords, it will decrypt them and the key will appear in RAM. Then the malware finds the exact location in the code where the key appears and sets a &#8220;breakpoint&#8221; there. When the browser reaches that point, it will stop.<\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/5ddf8bdf-02df-4a70-bd3f-cae23c970f4c-1776158274.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24058\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/5ddf8bdf-02df-4a70-bd3f-cae23c970f4c-1776158274.png\" alt=\"5ddf8bdf 02df 4a70 Bd3f Cae23c970f4c 1776158274\" width=\"850\" height=\"389\" \/><\/a><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Then, VoidStealer will directly read the key value in the register\/memory without needing further hacking.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><img decoding=\"async\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/7d79bf41-8079-41ad-b5be-967b95fa74bd.png\" alt=\"\" \/><\/span><\/p>\n<p><a href=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/9bfc0ef7-f1b7-418c-8971-4838f63284a6-1776158409.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-24060\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/9bfc0ef7-f1b7-418c-8971-4838f63284a6-1776158409.png\" alt=\"9bfc0ef7 F1b7 418c 8971 4838f63284a6 1776158409\" width=\"900\" height=\"473\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/9bfc0ef7-f1b7-418c-8971-4838f63284a6-1776158409.png 900w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/2026\/04\/9bfc0ef7-f1b7-418c-8971-4838f63284a6-1776158409-700x368.png 700w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/a><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">Finally, the attacker uses the key to decrypt passwords, cookies, and even sessions. At this point, the attack is complete.<\/span><\/p>\n<h2 id=\"conclusion\"><span style=\"font-family: arial, helvetica, sans-serif\">Conclusion<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif\">VoidStealer is not just a new infostealer; it clearly indicates how attack methods in the malware world are changing. Instead of breaking through protective layers as before, VoidStealer takes a more sophisticated approach: exploiting the system&#8217;s legitimate mechanisms to bypass security. This poses a significant challenge for both users and security solutions, as the line between legitimate and malicious behavior becomes increasingly blurred. In this context, defense is no longer just a matter of technology but also awareness and usage habits. Simple actions like controlling download sources, protecting accounts, and being alert to unusual signs are the most effective defenses against sophisticated threats like VoidStealer.<\/span><\/p>\n<h2 id=\"recommendations\"><span style=\"font-family: arial, helvetica, sans-serif\">Recommendations<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Protect your account (top priority)<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Enable MFA\/2FA for all important accounts<\/strong><\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Email (Gmail, Outlook\u2026)<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Social media<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Work accounts<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Do not save important passwords in the browser.<\/strong><\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Especially: primary email, financial accounts<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Use a dedicated password manager (Bitwarden, 1Password\u2026)<\/strong><\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Limit the risk of initial infection<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Only download software from official websites.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Check the digital signature if available.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Protect your browser environment<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Always update:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Chrome \/ Edge to the latest version<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Limit extensions:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Only install extensions that are truly necessary.<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">Remove unfamiliar or unused extensions.<\/span><\/li>\n<\/ul>\n<h2 id=\"mapping-mitre-attampck\"><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Mapping MITRE ATT&amp;CK<\/strong><\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>T1204 \u2013 User Execution:<\/strong>\u00a0The user runs a malicious file.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>T1622 \u2013 Debugger Evasion:<\/strong>\u00a0abuse debugger<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>T1055 \u2013 Process Injection:<\/strong>\u00a0NOT used \u2192 no detection<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>T1027 \u2013 Obfuscated\/Hidden execution<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>T1057 \u2013 Process Discovery:<\/strong>\u00a0Find browser process<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>T1005 \u2013 Data from Local System:<\/strong>\u00a0Collect local data<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>T1555 \u2013 Credentials from Password Stores:<\/strong>\u00a0Retrieve passwords from the browser<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>T1552 \u2013 Unsecured Credentials:<\/strong>\u00a0Cookie\/session<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>T1055.012 \u2013 Process Hollowing:<\/strong>\u00a0not directly, but related to memory<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>T1003 \u2013 OS Credential Dumping:<\/strong>\u00a0concept t\u01b0\u01a1ng t\u1ef1<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>T1113 \u2013 Screen\/Data capture:<\/strong>\u00a0conceptual<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>T1123 \u2013 Audio Capture:<\/strong>\u00a0analogous \u2013 runtime capture<\/span><\/p>\n<h2 id=\"ioc\"><span style=\"font-family: arial, helvetica, sans-serif\"><strong>IOC<\/strong><\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><strong>Hash<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif\">f783fde5cf7930e4b3054393efadd3675b505cbef8e9d7ae58aa35b435adeea4<\/span><\/li>\n<\/ul>\n<h2 id=\"reference\"><span style=\"font-family: arial, helvetica, sans-serif\">Reference<\/span><\/h2>\n<ol>\n<li><span style=\"font-family: arial, helvetica, sans-serif\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/voidstealer-malware-steals-chrome-master-key-via-debugger-trick\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">VoidStealer malware steals Chrome master key via debugger trick<\/a><\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif\"><a href=\"https:\/\/www.gendigital.com\/blog\/insights\/research\/voidstealer-abe-bypass\" target=\"_blank\" rel=\"noopener ugc nofollow\">Gen Blogs | VoidStealer: Debugging Chrome to Steal Its Secrets<\/a><\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<table style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\"><span style=\"font-family: arial, helvetica, sans-serif\"><b>Exclusive article by an expert from FPT IS, FPT Corporation<\/b><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><b><i>Luu Tuan Anh &#8211; FPT Information Security Center<\/i><\/b><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"author":21,"featured_media":24048,"parent":0,"template":"","nang_luc":[],"danh_muc_goc_nhin_so":[],"dich_vu":[],"linh_vuc":[],"platform":[],"san_pham":[],"the_goc_nhin_so":[],"class_list":["post-24045","goc_nhin_so","type-goc_nhin_so","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so\/24045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so"}],"about":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/types\/goc_nhin_so"}],"author":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/users\/21"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media\/24048"}],"wp:attachment":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media?parent=24045"}],"wp:term":[{"taxonomy":"nang_luc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/nang_luc?post=24045"},{"taxonomy":"danh_muc_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/danh_muc_goc_nhin_so?post=24045"},{"taxonomy":"dich_vu","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/dich_vu?post=24045"},{"taxonomy":"linh_vuc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/linh_vuc?post=24045"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/platform?post=24045"},{"taxonomy":"san_pham","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/san_pham?post=24045"},{"taxonomy":"the_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/the_goc_nhin_so?post=24045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}