# New "Storm" Infostealer Exploits Server-Side Decryption to Bypass MFA and Hijack Sessions
A newly discovered infostealer malware called "Storm" is shifting the attack paradigm by eliminating the need for client-side decryption of stolen browser data. Instead, the malware sends encrypted browser session tokens directly to attacker-controlled servers, where they are decrypted and weaponized for immediate session hijacking—bypassing both passwords and multi-factor authentication in the process. Security researchers at Varonis have detailed the sophisticated approach, highlighting a dangerous evolution in credential theft tactics.
## The Threat: Session Hijacking Without Decryption
Traditional infostealer malware typically operates by:
1. Stealing encrypted credentials and session tokens from the victim's browser storage
2. Exfiltrating those encrypted artifacts to attacker infrastructure
3. Requiring the attacker to decrypt locally before using the stolen credentials
Storm fundamentally changes this workflow. Rather than extracting plaintext credentials or attempting decryption after exfiltration, Storm captures active browser sessions and transmits them to the attacker's command-and-control (C2) server in a state that allows immediate use.
This architectural shift has profound implications:
## Background and Context
### The Evolution of Infostealers
Infostealers have long been a cornerstone of the cybercriminal toolkit. Malware like Redline, Raccoon, Meta Stealer, and Lumma have stolen credentials and personal data for years, with stolen account packages regularly appearing on dark web marketplaces at prices ranging from dollars to hundreds of dollars depending on account value.
However, the traditional model has always required a degree of operational overhead on the attacker side:
Storm eliminates these friction points by performing session hijacking—one of the most direct forms of account takeover available to an attacker.
### Why Session Tokens Matter More Than Passwords
Modern web applications increasingly rely on session tokens rather than password-based authentication. When you log into a bank, email provider, or SaaS platform, the server issues a session token (often a JSON Web Token or similar construct) that proves your authenticated identity for a defined period.
If an attacker possesses your session token, they don't need your password. They don't need to bypass MFA. They simply present the token and the server grants access as if you're the legitimate user.
Storm's innovation lies in stealing and deploying these tokens with surgical precision.
## Technical Details
### How Storm Operates
According to Varonis research, Storm performs the following attack sequence:
| Stage | Action | Outcome |
|-------|--------|---------|
| Execution | Malware executes on compromised host | User unaware; malware gains process-level access |
| Collection | Extracts browser memory and session storage | Captures active session tokens, cookies, and cached credentials |
| Exfiltration | Sends stolen tokens to C2 server | Attacker receives authenticated sessions |
| Exploitation | C2 server uses tokens to access victim accounts | Attacker bypasses login screens and MFA entirely |
### The Server-Side Decryption Advantage
Traditional infostealers often steal encrypted credential stores (like Chrome's Local State file containing encrypted passwords). The attacker must:
1. Obtain the victim's encryption key (often embedded in the Local State file or Windows credential storage)
2. Decrypt the stored credentials locally or send encrypted data + key to a decryption service
3. Test credentials for validity before selling or using them
Storm bypasses this entirely by targeting active sessions. These sessions are:
By performing the decryption on the attacker's server—where the tokens are already in plaintext—Storm enables immediate abuse without the overhead of traditional credential processing.
### MFA Bypass Mechanism
Multi-factor authentication (MFA) works by adding a second proof of identity after password entry:
Storm circumvents this by stealing the final session token rather than attempting to crack the initial password. The token already represents successful MFA completion, so no second factor is required.
## Implications for Organizations
### Widespread Exposure
Organizations across all sectors face exposure:
### Detection Challenges
Storm's approach presents specific detection hurdles:
### Supply Chain Risk
Employees infected with Storm become vectors for corporate espionage. Attackers could:
## Recommendations
### For Security Teams
Immediate Actions:
Medium-Term Strategies:
### For End Users
### For Cloud and SaaS Providers
## Conclusion
Storm represents a maturation of infostealer tactics, removing operational complexity from the attacker side while amplifying risk for organizations. By targeting session tokens instead of raw credentials, Storm enables immediate account takeover and bypasses MFA—two of the most widely deployed security controls.
Organizations must adopt a layered defense strategy that assumes credential compromise is inevitable and implements additional verification mechanisms beyond session tokens alone. The days of session-based authentication as a complete proof of identity are effectively over in the presence of sophisticated infostealers like Storm.
Vigilance, rapid patching, and defense-in-depth approaches remain the most reliable weapons against this evolving threat.