Google Chrome Rolls Out Device-Bound Session Credentials to Combat Cookie-Stealing Malware

Available in: 中文
2026-04-10T12:08:06.175Z·1 min read
- Cryptographically binds Workspace session cookies to the device's hardware - Stolen cookies become useless on any other machine - Currently rolling out in beta for Chrome 146 on Windows - macOS s...

Google has launched a new security feature in Chrome 146 for Windows that cryptographically binds login cookies to a device's hardware, making stolen session tokens useless to remote attackers. The feature, called Device Bound Session Credentials (DBSC), directly addresses the type of attack that compromised Linus Tech Tips and numerous other high-profile accounts.

The Problem: Session Token Theft

Cookie-stealing malware has seen an "exponential rise" over the past two years, according to Google. Attackers trick victims into downloading malicious files — often disguised as brand sponsorship offers or software updates — that exfiltrate session cookies to remote servers. These stolen cookies allow attackers to bypass two-factor authentication entirely, since the theft occurs after the user has already authenticated.

How DBSC Works

Real-World Impact

Industry Adoption

Okta has expressed interest in the concept, and Microsoft Edge is also exploring similar approaches. Google recommends Workspace administrators also enable passkeys, now available to over 11 million customers.

This represents a fundamental shift in session security — moving from software-only protections to hardware-bound authentication that survives malware infection.

↗ Original source · 2026-04-10T00:00:00.000Z
← Previous: Iran's Supreme Leader: 'We Do Not Seek War' as Strait of Hormuz Enters New PhaseNext: Apple to Close Three Stores Including First Unionized U.S. Location, IAM Union Calls It Union Busting →
Comments0