Security & Infrastructure Tools
Google Chrome Adds Infostealer Protection Against Session Cookie Theft
Google Chrome has introduced Device Bound Session Credentials (DBSC) in version 146 for Windows, a new security feature that cryptographically ties session cookies to the user’s hardware—using TPM on Windows and Secure Enclave on macOS—to prevent infostealer malware from harvesting and re‑using stolen session data. The protocol requires proof of possession of a private key stored within the device, making exfiltrated cookies immediately unusable without that key. This addition aims to block sophisticated malware families such as LummaC2 from gaining unauthorized access to user accounts by protecting session tokens with hardware-bound encryption.

GOOGLE CHROME ADDS INFOSTEALER PROTECTION AGAINST SESSION COOKIE THEFT
- Overview
- Google Chrome introduces a hardware-bound protection layer for session credentials, named Device Bound Session Credentials (DBSC).
- The feature is available in Chrome 146 for Windows, with macOS support planned for a future release.
- The goal is to prevent information-stealing malware from harvesting session cookies by tying sessions to the device’s hardware.
- Core Idea: What DBSC Is and Why It Matters
- DBSC associates each user session with a unique key pair generated and stored in hardware components such as a computer’s Trusted Platform Module (TPM) on Windows or the Secure Enclave on macOS.
- The private key used to protect and prove possession of a session cannot be exported from the device, making stolen data less useful to attackers.
- By design, DBSC aims to ensure that session cookies are only usable when the browser can demonstrate possession of the corresponding private key.
- How DBSC Works in Practice3.1 Private Keys and Hardware Roots
- Keys are created and safeguarded by the device’s security hardware, ensuring that the private key remains non-exportable.
- The security chip’s role is to generate and securely hold the material needed to prove a session’s legitimacy.
3.2 Proving Possession to the Server
- Issuing new, short-lived session cookies requires the browser to prove possession of the private key to the server.
- Without successful proof, newly issued cookies are withheld, and any exfiltrated cookies become ineffective almost immediately.
3.3 Privacy-Preserving Session Design
- Each session is backed by a distinct key, preventing websites from correlating activity across multiple sessions or sites on the same device.
- The protocol exchanges only the necessary per-session public key to certify possession, avoiding leakage of broader device identifiers.
- The DBSC Flow: A Step-by-Step View4.1 Session Creation and Hardware Binding
- When a user authenticates, a session is established and bound to the hardware-bound key pair.
- The server and browser coordinate to ensure the session is tied to a specific device.
4.2 Server Verification for Cookie Issuance
- For every request that would generate a new or refreshed session cookie, the server requires proof that the browser holds the matching private key.
- This proof is cryptographic and bound to the hardware, making replication or export of credentials ineffective.
4.3 Handling Potential Cookie Theft
- If an attacker steals a session cookie but cannot present the corresponding private key, the cookie cannot be used to gain ongoing access.
- The combination of hardware-bound keys and short-lived cookies dramatically reduces the value of stolen cookies.
- Platform Availability and Implementation Details5.1 Windows Availability
- Chrome 146 on Windows ships with DBSC protection, providing immediate benefits for users running compatible hardware.
5.2 macOS Roadmap
- macOS users can expect DBSC protection in a forthcoming Chrome release; exact timing will be announced by Google.
5.3 Open Standards and Industry Collaboration
- The DBSC approach was developed in collaboration with industry partners, including Microsoft, and is positioned as an open web standard.
- Google has sought input from a broad security ecosystem and has published implementation guidance for developers.
- Developer and Deployment Considerations6.1 Backend Requirements for DBSC
- Websites can enable hardware-bound sessions by adding dedicated registration and refresh endpoints to their backends.
- This upgrade path allows backward compatibility with existing frontend while adopting DBSC-backed sessions.
6.2 Frontend Compatibility and Progress
- The DBSC flow is designed to minimize disruption to existing user experiences while enhancing security.
- Developers are encouraged to consult official DBSC implementation guides and related specifications for integration details.
- Security Implications and Observed Impact
- Infostealer families, such as LummaC2, historically target session cookies to impersonate users.
- By binding sessions to hardware and requiring proof of key possession for new cookies, the attack surface for cookie theft is substantially reduced.
- Early testing with partner platforms showed a notable decline in session theft events as the DBSC model matured.
- Illustrative Elements and References
- A visual diagram of the DBSC interaction between browser and server helps convey the flow of proofs of possession and cookie issuance.
- The design emphasizes minimal information exchange and avoids exposing device identifiers beyond what is necessary to certify possession.
- Related Concepts and Context
- Session cookies function as authentication tokens created server-side after user login and presented by the browser for subsequent requests.
- The DBSC approach complements existing security measures by embedding a hardware-backed root of trust into the session lifecycle.
- Summary of Key Points
- DBSC ties each session to hardware-bound keys, preventing unauthorized use of stolen cookies.
- Windows users get immediate DBSC protection with Chrome 146; macOS support is forthcoming.
- The protection relies on the device’s TPM or Secure Enclave, ensuring private keys cannot be exported.
- Server-side issuance of new cookies depends on cryptographic proof of key possession, reducing the usefulness of stolen data.
- The approach is designed with privacy in mind, avoiding cross-session correlation and minimizing exposure of device identifiers.
- Visual and Reference Notes
- Diagrams and explanatory materials illustrate the DBSC flow and the relationship between browser, server, and hardware-backed credentials.
- Developer resources outline the steps to integrate DBSC support into existing web services while maintaining frontend compatibility.