Connect with Us!
Subscribe to receive new blog post from PureID in your mail box
You log into your Microsoft 365 account, breeze through multi-factor authentication (MFA), and feel secure. But while you're at ease, someone else quietly slips in through the back door—no alarms, no malware alerts—just a stolen session cookie turning your session into their playground.
Welcome to Cookie Bite, a sophisticated attack technique developed as a proof-of-concept (PoC) by Varonis Threat Labs. Cookie Bite uses browser extensions and automation scripts to steal session cookies and maintain unauthorized access to cloud services like Outlook and Teams. It’s not just clever—it’s alarmingly hard to detect.
What is Cookie Bite?
It’s a session hijacking attack targeting Azure Entra ID (formerly Azure Active Directory), the identity provider behind Microsoft 365.
It exploits two critical authentication cookies:
By stealing these cookies, attackers bypass MFA entirely—replaying valid sessions without needing your credentials.
The Varonis PoC showed exactly how devastatingly easy this can be:
Every login refreshes their access - You keep logging in, they keep slipping in.
Cookie theft isn't limited to this one method. Attackers are getting creative:
The common theme? - Bypass credentials. Exploit sessions. Sidestep MFA.
Once inside, attackers gain full user privileges. They can:
Worse yet, because they’re using your authenticated session, their activities blend seamlessly into legitimate traffic, making detection incredibly difficult.
5. Why Cookie Bite Is So Dangerous
Unlike traditional malware:
It’s a browser-level persistence that evades most endpoint detection and response (EDR) tools. Security tools are looking for malware; attackers are stealing cookies.
You can’t rely on MFA alone anymore. Here's what smart defenders are doing:
Adopt a Zero Trust Model: Use solutions like PureAuth to enforce logins only from authorized, compliant, and healthy devices.
Use Microsoft Risk-Based Detection: Set up alerts for atypical login behavior that may signal session hijacking.
Lock Down Chrome Extensions: Restrict allowed extensions via ADMX policies—only allow vetted, secure add-ons.
Block Developer Mode in Chrome: Prevent sideloading of unsigned extensions through policy enforcement.
Monitor Azure and Cloud Logs: Actively watch for suspicious session activities that might otherwise be missed.
Cookie Bite is not just a clever exploit—it’s a signpost for the future of cybersecurity. Authentication alone is no longer enough. Attackers aren’t breaking in by smashing down doors; they’re walking through them with stolen keys, blending in, operating silently. The next era of security isn't about better passwords or even stronger MFA. It's about continuous trust verification, session protection, and relentless monitoring. If your defenses stop at login, you’ve already lost.
In a world where attackers move faster than policies, your survival depends on evolving faster than their imagination.
Secure the session. Harden the browser. Assume every interaction is a battlefield. Because in this new landscape, it’s not just about keeping intruders out. It’s about ensuring they were never inside to begin with.
Subscribe to receive new blog post from PureID in your mail box