Ransomware & Malware

Storm Infostealer Hijacks Sessions Server-Side

Imagine logging into your corporate email, only for a cybercrook halfway across the world to slip in behind you—using your own active session. Storm's doing exactly that, and it's dirt cheap.

Storm infostealer control panel showing hijacked browser sessions and decrypted credentials

Key Takeaways

  • Storm decrypts stolen browser data server-side, dodging endpoint detection tools.
  • Automated session hijacking bypasses MFA, enabling passwordless access to SaaS and cloud tools.
  • Sold as cheap SaaS ($900/month), it's fueling account takeovers worldwide with 1,700+ active logs.

Look, we’ve all been here before. Back in the early 2010s, infostealers were clunky little beasts—grabbing passwords off your local machine, leaving SQLite footprints everywhere for antivirus to stomp. Enterprises patted themselves on the back as endpoint detection got smarter. Then Chrome drops App-Bound Encryption in 2024, tying keys to the browser process itself. Game over for local decryption, right? Wrong. Storm just flipped the script.

This thing hit underground forums in early 2026, and it’s no amateur hour. For under a grand a month—$900 standard, $1,800 for teams—operators snag a toolkit that vacuums up browser creds, session cookies, crypto wallets, the works. But here’s the kicker: it doesn’t decrypt jack on your endpoint. Nope. Everything ships encrypted to the attacker’s server. Poof—your EDR tools stare blankly, no suspicious libraries loaded, no database pokes.

Why Storm’s Server-Side Trick Changes Everything

And it doesn’t stop at Chromium. Storm handles Firefox, Waterfox, Pale Moon—all server-side, unlike StealC V2 which still fumbles Gecko browsers locally. Varonis Threat Labs nailed it in their breakdown:

“Storm takes this approach further by handling both Chromium and Gecko-based browsers (Firefox, Waterfox, Pale Moon) server-side, where StealC V2 still processes Firefox locally.”

That’s the shift. No more noisy local antics. Just silent exfiltration.

Picture this: your sales VP’s browser gets hit. Storm grabs session cookies, Google tokens, autofill data—everything. Ships it off. Attacker’s panel decrypts, then—bam—automated cookie restore. Plug in a refresh token and a matching SOCKS5 proxy, and they’re logged into Salesforce, Okta, your AWS console. No password prompt. No MFA ping. It’s authenticated access, straight from hell.

I’ve seen echoes of this before. Remember the 2018 SamSam ransomware crew? They’d snag RDP creds locally, but endpoint tools caught ‘em half the time. Fast-forward, and we’re at session hijacking as a service. Storm’s not inventing the wheel—Varonis’s own Cookie-Bite research showed stolen Azure Entra ID cookies nuking MFA for Microsoft 365. SessionShark phished tokens in real-time. But Storm? It productizes it. Subscription model. Team seats. Domain auto-tagging for Google, Facebook, Coinbase. Lazy crooks’ dream.

Is Storm Already Hitting Your Users?

Short answer: probably. At analysis time, the logs panel brimmed with 1,715 entries—India, US, Brazil, Indonesia, you name it. Crypto hits on Binance, Blockchain.com. Real or test? IPs and data volumes scream active campaigns. Pricing’s tiered: $300 for a 7-day taste, up to $1,800/month for 100 seats and 200 builds. Builds keep running post-sub—deploy and ghost.

Operators wire their own VPS to Storm’s hub, so takedowns bounce off the central node. Smart. File grabber yanks docs from user dirs. Telegram, Signal, Discord sessions. Crypto extensions and desktops. Multi-monitor screenshots. All in-memory, stealthy as a shadow.

Here’s my unique take, one you won’t find in the Varonis post: this reeks of RedLine’s evolution. Remember RedLine? The infostealer kingpin from 2020 that flooded Telegram markets? It went subscription too, scaled via builders. Storm’s panel—with cookie restore, team perms, domain rules—feels like RedLine 2.0, hardened against Chrome 127 and EDR. Prediction: by 2027, 70% of stealers will be server-side. Local decryption? Museum relic. Who’s making bank? Not you. Underground devs raking $1k/month per sucker operator, who then flip creds on markets for 10x ROI.

But let’s get cynical. Enterprises, you’re still betting on endpoint magic. Newsflash: Storm laughs at it. Your CISO’s dashboard shows clean. Meanwhile, some phishing’d intern just handed over your entire SaaS stack. And the PR spin from browser vendors? ‘App-Bound fixes it!’ Yeah, until stealers adapt—as they always do. Twenty years in this circus, I’ve watched antivirus whack-a-mole lose every round.

How Does Storm Sneak Past Chrome’s App-Bound Encryption?

Simple. No local decrypt. Old stealers injected into Chrome or abused debugging—traces galore. Storm exfils encrypted blobs intact. Server-side magic handles the rest, no telemetry for your tools. Add in-memory execution, custom VPS routing, and it’s ghost protocol.

Team features? Multiple workers divvy logs, builds, restores. One license runs a mini crime syndicate. Domain detection auto-sorts loot—cPanel here, Twitter there. Prioritize, pounce.

Worse: it grabs beyond browsers. Crypto wallets via extensions and apps. Messaging app sessions. Browsing history for recon. One infection, total compromise.

So, what’s the fix? Browser vendors, tighten session binding—maybe tie cookies to hardware fingerprints. Enterprises, hunt for anomalous exfil, not just local processes. MFA? Useless against cookie theft. Push certificate auth, device trust. But don’t hold your breath—attackers adapt faster than you patch.

This isn’t hype. It’s the new normal. Storm’s cheap, effective, evasive. Your browser’s not a vault anymore. It’s a delivery service for session keys.


🧬 Related Insights

Frequently Asked Questions

What is Storm infostealer and how does it work?
Storm’s a subscription malware ($900/month) that steals browser data like cookies and creds, exfils encrypted to attacker servers for decryption—bypassing local detection.

Does Storm beat Chrome’s App-Bound Encryption?
Yes, by avoiding local decryption entirely; it ships encrypted files server-side, evading EDR tools that watch for on-device tampering.

Can Storm hijack my active sessions?
Absolutely—its panel auto-restores stolen cookies with proxies, granting passwordless access to SaaS, email, crypto accounts.

Sarah Chen
Written by

AI research editor covering LLMs, benchmarks, and the race between frontier labs. Previously at MIT CSAIL.

Frequently asked questions

What is Storm infostealer and how does it work?
Storm's a subscription malware ($900/month) that steals browser data like cookies and creds, exfils encrypted to attacker servers for decryption—bypassing local detection.
Does Storm beat Chrome's App-Bound Encryption?
Yes, by avoiding local decryption entirely; it ships encrypted files server-side, evading EDR tools that watch for on-device tampering.
Can Storm hijack my active sessions?
Absolutely—its panel auto-restores stolen cookies with proxies, granting passwordless access to SaaS, email, crypto accounts.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Varonis Blog

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.