{"id":13861,"date":"2019-08-07T11:45:20","date_gmt":"2019-08-07T15:45:20","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=13861"},"modified":"2020-03-26T18:22:37","modified_gmt":"2020-03-26T14:22:37","slug":"browser-data-theft","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/browser-data-theft\/13861\/","title":{"rendered":"How malware steals autofill data from browsers"},"content":{"rendered":"<p>Most browsers kindly offer to save your data: account credentials, bank card details for online stores, billing address, name, and passport number for travel sites, and so on. It\u2019s convenient and saves having to fill out the same forms all over again or worry about forgotten passwords. However, there is a catch: All of this autofill data can be scooped up by cybercriminals if your computer gets infected by a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/psw-trojans-password-stealing-trojans\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">stealer<\/a> \u2014 a piece of malware that steals information, including from browsers.<\/p>\n<p>Such programs are becoming increasingly popular with online scammers: In the first half of this year alone, Kaspersky\u2019s security products <a href=\"https:\/\/securelist.com\/how-to-steal-a-million-of-your-data\/91855\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">detected more than 940,000 stealer attacks<\/a>. That is a one-third increase from the same period of 2018.<\/p>\n<p>Strictly speaking, stealers are interested in more than just browsers\u2019 autofill data \u2014 they are also looking for cryptocurrency wallets and gaming data, and they steal files from the desktop as well (we hope you don\u2019t store valuable information there, such as password lists).<\/p>\n<p>However, browsers have become a hub of work and play, including shopping, banking and more, and are often a source of far more confidential information than other programs. Let\u2019s take a look at how stealers get their thieving hands on browser data.<\/p>\n<h2>How browsers store your autofill data<\/h2>\n<p>Browser developers seek to protect the information entrusted to them. To do so, they encrypt it, and decryption is possible only on the same device and from the same account that saved it. So if someone simply steals a file with autofill data, they won\u2019t be able to use it \u2014 everything in it is securely encrypted.<\/p>\n<p>But, there\u2019s a but. By default, browser developers assume that your device and account are well protected, meaning that any program running from your account on your computer is acting on your behalf and therefore should be able to extract and decrypt saved data. Unfortunately, this also applies to malware that has penetrated the device and is running under your account.<\/p>\n<p>The only browser that offers extra protection for stored data against third parties is Firefox, which allows you to create a master password that you have to enter when you need the data to be decrypted and used for autofill. However, this option is disabled by default.<\/p>\n<h3>How malware steals data from Chrome<\/h3>\n<p>Google Chrome and other browsers based on the Chromium engine (such as Opera and Yandex.Browser) always store user data in the same place, so stealers have no problem finding it. In theory at least, this data is stored in encrypted form. However, if the malware has already penetrated the system, then its actions are done in your name.<\/p>\n<p>Therefore, the malware simply puts in a polite request to the browser\u2019s data encryption tool to decrypt information stored on your computer. With requests seemingly from the user considered safe by default, in response the stealer gets all your passwords and credit card details.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n<h3>How malware steals data from Firefox<\/h3>\n<p>Firefox operates a bit differently. To hide password databases and more from strangers, the browser creates a profile with a random name, so the malware cannot know in advance where to look for it. However, the name of the file with the saved data does not change, so there is nothing to prevent the stealer from sifting through all profiles (the folders containing them are stored in one place) and identify the desired file.<\/p>\n<p>After that, the malware again asks the relevant browser module to decrypt the files, and it succeeds, because it is supposedly acting on your behalf.<\/p>\n<h3>How malware steals data from Internet Explorer and Edge<\/h3>\n<p>Native Windows browsers use special storage for your data. The precise method and type of storage depend on the version of the application, but regardless, the reliability leaves much to be desired. Here, too, the malware can easily retrieve your passwords and credit card details by requesting it from storage, seemingly on your behalf.<\/p>\n<p>The problem is that the malware\u2019s request for the decryption of browser data appears to come from the user, so the browser has no reason to say no.<\/p>\n<h2>What happens to data stolen by the stealer?<\/h2>\n<p>Once the malware has the autofill data in plain text, it sends them back to cybercriminals. From there, either of two scenarios may unfold. The malware\u2019s handlers can use it themselves or, more likely, sell it to other malefactors on the black market, where such products are always highly prized.<\/p>\n<p>Either way, if usernames and passwords were among the stored information, the crooks will likely steal a couple of your accounts and try to finagle money out of your friends. If you saved bank card data in the browser, the losses could be more direct; your money will either be spent or transferred elsewhere.<\/p>\n<p>Stolen accounts can be used for many other purposes too, from spamming and promotion of websites or apps, to sending viruses and laundering money stolen from others (and if the police get involved, they may come knocking on your door).<\/p>\n<h2>How to protect data from stealers<\/h2>\n<p>As you can see, if malware penetrates your computer, data stored in the browser is at risk, and with it your finances and reputation. To avoid such a situation:<\/p>\n<ul>\n<li>Do not entrust important information such as bank card details to your browser for safekeeping. Instead, enter them manually each time \u2014 it takes longer but is safer. You can also store passwords in a <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a>.<\/li>\n<li>If you use Firefox, you can protect browser-stored data with a master password. To do so, click on the three bars in the upper right corner of the browser and select <em>Options<\/em>, go to the <em>Privacy &amp; Security<\/em> tab, scroll down to <em>Logins and Passwords<\/em>, and select the <em>Use a master password<\/em> box. The browser will ask you to create this password \u2014 the <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/strong-password-day\/15291\/\" target=\"_blank\" rel=\"noopener noreferrer\">longer and more complex<\/a>, the harder it will be for attackers to crack.<\/li>\n<li>Most important: The best way to safeguard data is to prevent malware from getting onto your computer in the first place. To do so, install a <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a> that will keep infections at bay. No malware, no problem!<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n","protected":false},"excerpt":{"rendered":"<p>We explain how malware steals passwords and other valuable data stored in the browser \u2014 and how to protect yourself.<\/p>\n","protected":false},"author":2509,"featured_media":13862,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[1636,16,1548,21,25,187,2151,692],"class_list":{"0":"post-13861","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-browsers","9":"tag-chrome","10":"tag-edge","11":"tag-firefox","12":"tag-internet-explorer","13":"tag-passwords","14":"tag-stealers","15":"tag-trojans"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/browser-data-theft\/13861\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/browser-data-theft\/16461\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/browser-data-theft\/6426\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/browser-data-theft\/18369\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/browser-data-theft\/16511\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/browser-data-theft\/15131\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/browser-data-theft\/19051\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/browser-data-theft\/17761\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/browser-data-theft\/23341\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/browser-data-theft\/6326\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/browser-data-theft\/27871\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/browser-data-theft\/12223\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/browser-data-theft\/11063\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/browser-data-theft\/19891\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/browser-data-theft\/23883\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/browser-data-theft\/18825\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/browser-data-theft\/23173\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/browser-data-theft\/23107\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/passwords\/","name":"passwords"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2509"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13861"}],"version-history":[{"count":6,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13861\/revisions"}],"predecessor-version":[{"id":16218,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13861\/revisions\/16218"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13862"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}