This New Tool Can Steal Your Passwords And Info – Even With 2FA Enabled

This New Tool Can Steal Your Passwords And Info – Even With 2FA Enabled

SlashGear
SlashGearApr 14, 2026

Why It Matters

Storm demonstrates that traditional 2FA and browser hardening are no longer sufficient, forcing enterprises and users to rethink endpoint security and adopt stronger authentication methods.

Key Takeaways

  • Storm steals encrypted browser data and decrypts it on remote servers.
  • Bypasses two‑factor authentication using harvested session cookies.
  • Operates exclusively on Windows, targeting browsers, crypto wallets, and messaging apps.
  • Sold as a subscription service: $300 demo, $900 monthly, $1,800 enterprise.
  • Data exfiltration continues even if the subscriber’s payment lapses.

Pulse Analysis

Storm’s technical edge lies in stealing encrypted browser files rather than cracking them locally. By routing stolen SQLite databases to a remote server, the malware sidesteps browser‑based defenses such as App‑Bound Encryption. Once the data reaches the attacker’s infrastructure, it is decrypted in a controlled environment, allowing the creation of valid session cookies that silently bypass two‑factor authentication. This remote‑first approach expands the attack surface, making even well‑configured Windows workstations vulnerable to credential theft, crypto wallet hijacking, and real‑time data harvesting.

The malware’s distribution model mirrors legitimate SaaS offerings, positioning Storm as a subscription‑based weapon. A $300 trial grants full access for a week, while a $900 monthly fee unlocks continuous operation, and an $1,800 enterprise tier supports up to 100 operators. This pricing structure lowers the barrier to entry for low‑skill cybercriminals, turning sophisticated credential‑stealing capabilities into a commoditized service. As a result, the threat can scale rapidly, pressuring security teams to monitor not only traditional malware signatures but also the emerging ecosystem of cyber‑crime marketplaces.

Mitigation now requires a layered strategy. Enabling passkeys wherever possible eliminates reliance on OTP‑based 2FA that Storm can circumvent via session cookies. Organizations should enforce strict browser hardening, regularly update Chromium‑based browsers, and deploy endpoint detection that flags anomalous file exfiltration. Continuous monitoring for unfamiliar login locations and unexpected password changes can provide early warning of a breach. Ultimately, the rise of remote‑decryption infostealers like Storm underscores the need for zero‑trust architectures and proactive threat‑intel sharing across the industry.

This New Tool Can Steal Your Passwords And Info – Even With 2FA Enabled

Comments

Want to join the conversation?

Loading comments...