VoidStealer Bypasses Chrome ABE Using Debugger Trick
VoidStealer v2.0 becomes the first infostealer to extract Chrome's v20_master_key using hardware breakpoints. No injection or privilege escalation required.
A new version of the VoidStealer infostealer has become the first malware observed in the wild using a debugger-based technique to bypass Chrome's Application-Bound Encryption (ABE) and steal the master key used to decrypt saved passwords and cookies. The technique requires no code injection, no privilege escalation, and works entirely in user mode.
Gen Threat Labs published their analysis on March 19, crediting researcher Vojtěch Krejsa with the discovery. VoidStealer v2.0 shipped to customers on March 13, just three months after the malware first appeared on darkweb forums.
How the Bypass Works
Google introduced Application-Bound Encryption in Chrome 127 (June 2024) to protect cookies and credentials from theft. ABE encrypts sensitive data using a key that's supposed to be accessible only to Chrome itself. Previous bypass techniques required either privilege escalation or injecting code into the browser process—both detectable by security tools.
VoidStealer takes a different path. Instead of injection, it attaches to Chrome as a debugger and sets hardware breakpoints at the precise moment when the decryption key exists in plaintext memory.
The attack flow breaks down like this:
- VoidStealer spawns Chrome using
CreateProcessWwith theCREATE_SUSPENDEDandSW_HIDEflags—starting the browser paused and invisible - It resumes the process and attaches as a debugger via
DebugActiveProcess - The malware monitors for
chrome.dllormsedge.dllto load - Once loaded, it scans the DLL's
.rdatasection for the stringOSCrypt.AppBoundProvider.Decrypt.ResultCode—a marker that appears right after Chrome decrypts the master key - Using
SetThreadContext, it sets a hardware breakpoint via theDR0register - When the breakpoint triggers, the
v20_master_keypointer sits in registerR15for Chrome orR14for Edge - Two
ReadProcessMemorycalls extract the key
The beauty of hardware breakpoints is that they're handled by the CPU itself, not by modifying code. This makes them harder to detect through integrity checks.
Borrowed Code, New Application
VoidStealer's developers didn't invent this technique. Gen's analysis traces the code directly to ElevationKatz, an open-source project by security researcher Meckazin that demonstrates weaknesses in Chrome's protection model. The project was built for research purposes—VoidStealer adapted it for theft.
This pattern repeats constantly in the infostealer space. Researchers publish proof-of-concept code to demonstrate vulnerabilities, and malware authors incorporate it within weeks. The gap between disclosure and exploitation keeps shrinking.
VoidStealer operates as a malware-as-a-service platform, first appearing on HackForums in mid-December 2025. The rapid evolution from v1.0 to v2.1 in three months shows active development. Earlier versions used injection-based ABE bypasses that security products could detect more easily. The debugger technique marks a significant stealth upgrade.
Why This Matters
Infostealers have become the dominant credential theft vector for enterprise environments. Recent research from Flare found that enterprise identity exposure from infostealer infections doubled throughout 2025, with projections suggesting one in five infections could yield corporate SSO credentials by late 2026.
The stolen data goes beyond passwords. Infostealers grab session cookies, which let attackers bypass MFA entirely by importing active sessions into their own browsers. Chrome's ABE was supposed to stop exactly this—cookies encrypted with keys that only Chrome could access.
VoidStealer's bypass means ABE alone won't protect users. The malware extracts the decryption key from memory, then uses it to decrypt all stored credentials and cookies at leisure.
Browser-based attacks have expanded rapidly. We've seen Chrome extension compromises and infostealers masquerading as AI tools across the past few months. VoidStealer represents the next evolution—attacking Chrome's encryption directly rather than working around it.
Detection and Defense
Gen's research identifies several behavioral indicators defenders should monitor:
- Applications debugging browsers — Legitimate software rarely attaches debuggers to Chrome or Edge
- Browser spawned with SW_HIDE flag — Hidden browser windows during startup are suspicious
- Hardware breakpoint manipulation — Modifying debug registers on browser threads isn't normal behavior
- ReadProcessMemory targeting browsers — Benign applications don't read Chrome's memory
Endpoint detection tools that monitor for debugger attachment to browser processes can catch this technique. The challenge is that VoidStealer operates entirely in user mode without requiring elevation—it can run with whatever permissions the victim already has.
For organizations, the practical defenses remain familiar: prevent the initial infection. VoidStealer spreads through the usual channels—phishing, malvertising, trojanized software. Once it's running, the credential theft happens fast.
Indicator of Compromise
VoidStealer v2.0 sample hash:
f783fde5cf7930e4b3054393efadd3675b505cbef8e9d7ae58aa35b435adeea4
Organizations should add this to their detection rules, though new samples with different hashes will certainly follow. The technique matters more than the specific binary—expect other infostealer families to adopt similar bypasses soon.
Related Articles
AuraStealer Spreads via TikTok ClickFix Scams, Targets 110+ Browsers
Russian-linked AuraStealer infostealer uses TikTok videos and 48 C2 domains to steal credentials. ABE bypass defeats Chrome's cookie encryption.
Mar 16, 2026MicroStealer Evades Detection With Electron-to-Java Payload Chain
New infostealer MicroStealer uses NSIS, Electron, and Java in a layered delivery chain that bypasses most security tools. Targets browser credentials and crypto wallets.
Mar 13, 2026AuraStealer Expands to 48 C2 Domains Filling Lumma Void
Russian-speaking developers behind AuraStealer infostealer scale infrastructure to 48 command-and-control domains, targeting 110+ browsers and 250+ extensions.
Mar 4, 2026Infostealers Now Targeting AI Agent Configurations
Hudson Rock detects Vidar infostealer exfiltrating OpenClaw AI agent files for the first time. Stolen configs include gateway tokens and cryptographic keys.
Feb 17, 2026