Pivot to the Clouds: Cookie Theft in 2024 · Embrace The Red
embracethered.com/blog/posts/2024/cookie-theft-in-2024-and-what-todoHere are the basic steps of what happens:
Malware runs on user’s machine
Malware connects to the debugging port
Attacker uses the cookies and gains access to resources
Note: This specific technique via the remote debugging port was originally described as “Cookie Crimes” by @mangopdf for Chrome.