VoidStealer: Advanced Infostealer Bypassing Chrome’s ABE

VoidStealer, an advanced infostealer, bypasses Chrome's ABE security (Chrome 127) by using hardware breakpoints to intercept the v20_master_key in plaintext. The malware, evolving rapidly with 12 versions, operates a MaaS model, indicating active development and market demand.
VoidStealer becomes part of a more comprehensive shift in just how infostealers are advancing post-ABE. The malware currently sustains several bypass techniques, falling back to older injection-based methods if needed, however plainly focusing on stealth where feasible.
Early Infostealer Bypass Techniques
Earlier bypass techniques found methods to go after decryption, some relying on process injection that entailed sliding malicious code into Chrome to conjure up a reputable decryption regimen. Much more innovative approaches abused Chrome’s altitude service or COM user interfaces to fool the browser into handing over decrypted material.
VoidStealer’s Rapid Development
Krejsa also advised of its growth rate. Considering that very first showing up in December 2025, the malware has actually evolved promptly through variations, recommending energetic upkeep and most likely customer demand in underground markets. The malware, which runs a MaaS model, has actually undergone a total of 12 versions thus far, with the most up to date version “v2.1” turned out on Mar 18.
Shweta has actually been covering enterprise innovation because 2017, most just recently reporting on cybersecurity for CSO online. She damages down complicated topics from ransomware to zero depend on design for both professionals and everyday viewers. She has a postgraduate diploma in journalism from the Asian University of Journalism, and takes pleasure in reading fiction, viewing films, and trying out brand-new dishes when she’s not hectic translating cyber dangers.
VoidStealer’s ABE Bypass Mechanism
By placing equipment breakpoints on a specific guideline connected to Chrome’s decryption flow, it intercepts the exact moment the v20_master_key shows up in plaintext in memory.
An ABE bypass focuses on a critical item of material, the “v20_master-key.” This trick is what inevitably opens kept internet browser keys, including symbols, cookies, and passwords, when the internet browser has confirmed the request. In theory, ABE keeps this key snugly guarded, ensuring it’s never ever exposed in a manner that malware can conveniently access it.
Called “VoidStealer,” the thief shows up to have actually located a method around ABE, introduced in Chrome 127 in 2024, a security control that secures delicate browser information, such as cookies and passwords, behind more powerful file encryption and connections decryption to a blessed system solution.
Instead of forcing Chrome to decrypt data or scraping memory generally, it attaches as a debugger and waits. By positioning hardware breakpoints on an exact guideline connected to Chrome’s decryption circulation, it intercepts the precise minute the v20_master_key appears in plaintext in memory.
Earlier bypass methods located methods to pursue decryption, some relying on process injection that involved sliding malicious code into Chrome to conjure up a legitimate decryption regimen. Others utilized memory dumping or remote debugging, scanning large portions of process memory to locate decrypted data. Advanced strategies abused Chrome’s altitude service or COM user interfaces to deceive the browser into handing over decrypted material.
1 ABE bypass2 Chrome security
3 Hardware breakpoints
4 Infostealer malware
5 Master key interception
6 VoidStealer
« Mastering Google Sheets with Gemini: Smart Fill, Formulas & Charts
