Regardless of enthusiast media sources celebrating Google’s attempts to tackle hacking groups in February’s updates to the Chrome browser, new posts on infostealer forums appear to show that malware traffickers are now keeping up with the tech titan’s latest encryption updates with the minimal issue.
In early February, Google released Chrome 80, which added the AES-256 encryption algorithm to the browser in an effort to prevent hackers from stealing user credentials.
Before, the browser had simply used the info protection API developed into Windows to protect sensitive user information. AES-256 was designed to combine that data protection API with the AES requirement to make information more secure; however, even with a minor hacker panic shortly after release, it appears that the added security isn’t panning out quite as the tech titan had imagined.
This quickly led to declarations that Google had crippled cybercrime hubs like the Genesis Store, a black marketplace for stolen browser data that amassed 90% of all stolen data through the Any.Run top ten threat AZORult malware, which had been deserted by its original author two years ago and wasn’t supposed to work with Chrome 80.
Nevertheless, a month later, BleepingComputer is disclosing in a recent exposé that not are old infostealer standards like Raccoon and KPot infostealer now posting updates to make their tools suitable for Chrome 80; however, the brand new encryption algorithm seems to have given new tools a chance to promote themselves as “Chrome 80 compatible.”