Back to Home
Technologydb#1929

$900 malware makes MFA useless—and anyone can buy it

(1w ago)
Global
techradar.com
$900 malware makes MFA useless—and anyone can buy it

$900 malware makes MFA useless—and anyone can buy it📷 Published: Apr 7, 2026 at 23:08 UTC

  • Storm-0558’s cookie theft bypasses MFA entirely
  • Rookie hackers now rent enterprise-grade hijacking tools
  • Crypto and corporate accounts face persistent access risks

$900 a month buys you a turnkey kit to hijack enterprise accounts—no advanced skills required. That’s the blunt reality of Storm infostealer, a malware-as-a-service tool that’s quietly rendering multi-factor authentication (MFA) irrelevant by stealing session cookies. Unlike credential stuffing or phishing, this method doesn’t trigger login alerts because it piggybacks on already authenticated sessions, giving attackers persistent access even after passwords change.

The tool’s pricing model—reportedly $900/month—signals a deliberate push to democratize high-stakes hacking. Where enterprise-grade account takeovers once required custom malware or nation-state resources, Storm-0558 packages the capability into a subscription. Early signals suggest it’s being used against both cryptocurrency platforms and corporate systems, where stolen cookies can unlock everything from financial transactions to internal dashboards.

This isn’t just another credential harvester. The real shift is in the workflow: attackers no longer need to crack MFA or social-engineer victims repeatedly. One successful cookie theft grants weeks or months of access, with no red flags for security teams scanning for brute-force attempts. For defenders, the gap between ‘secure’ MFA implementations and session-layer vulnerabilities just became a chasm.

The real-world gap between security specs and session reality

The real-world gap between security specs and session reality📷 Published: Apr 7, 2026 at 23:08 UTC

The real-world gap between security specs and session reality

The market context here is brutal. Enterprises have spent years pushing MFA as a silver bullet, only to face a tool that sidesteps it entirely by exploiting a fundamental web architecture flaw: session cookies are trusted implicitly. Unlike passwords, cookies aren’t tied to a second factor—they are the second factor once issued. Storm-0558’s turnkey approach means even mid-tier cybercriminals can now target high-value accounts without writing a line of code.

For users, the practical impact is a security theater collapse. Your YubiKey or authenticator app won’t save you if the attacker’s already inside your active session. The community response has been a mix of grim acceptance (‘we told you MFA wasn’t enough’) and frantic patching, but the deeper issue is structural: most organizations lack real-time session monitoring. Even Google’s Advanced Protection Program—often held up as the gold standard—relies on cookie-based sessions post-authentication.

The forward look isn’t pretty. If Storm-0558’s subscription model takes hold, we’re staring at a future where account hijacking scales like SaaS—cheap, repeatable, and hard to attribute. The real bottleneck may not be the malware’s capabilities, but the industry’s refusal to treat session security as seriously as password security.

In other words, we’ve spent a decade bolting locks on the front door while leaving the back window wide open. MFA was never the finish line—it was a single layer in a stack that’s now being exploited at its weakest point. The irony? The fix (session token rotation, behavioral analytics) has existed for years, but adoption lags because it’s ‘inconvenient.’

Storm MalwareMulti-Factor AuthenticationCybersecurity
// liked by readers

//Comments

RoboticsBaidu robotaxis grounded: China’s traffic chaos exposes real-world limitsAIDisney’s $1B AI bet collapses before the first frameMedicineInflammation’s Epigenetic Scars May Linger, Raising Colon Cancer RiskAIMistral’s tiny speech model fits on a watch—so what?MedicineBrain aging’s genetic map: AI hype vs. Alzheimer’s realityAIPorn’s AI Clones Aren’t Immortal—Just Better PackagedMedicine$100M federal bet on joint regeneration—what the trials can (and can’t) proveAIGitHub’s Copilot data grab: opt-out or be trainedMedicineRNA Sequencing UnifiesAIAI’s dirty little secret: secure by default is a mythSpaceEarth Formed From Inner Solar SystemAI$70M for AI code verification—because shipping works, not just generating itSpaceYouTube’s AI cloning tool exposes a deeper problemAIAI traffic now outpaces humans—but who’s really winning?SpaceSmile Mission to X-Ray Earth’s Magnetic ShieldAIGemini Live’s voice downgrade: AI progress or collateral damage?SpaceGamma Cas’s X-Ray Mystery Solved After 40 YearsGamingNvidia’s AI art war: Why players are sharpening the pitchforksSpaceUK’s AI probe into Microsoft isn’t just about Windows—it’s about controlTechnologyLeaked iPhone hacking tool exposes Apple’s zero-click blind spotRoboticsBaidu robotaxis grounded: China’s traffic chaos exposes real-world limitsAIDisney’s $1B AI bet collapses before the first frameMedicineInflammation’s Epigenetic Scars May Linger, Raising Colon Cancer RiskAIMistral’s tiny speech model fits on a watch—so what?MedicineBrain aging’s genetic map: AI hype vs. Alzheimer’s realityAIPorn’s AI Clones Aren’t Immortal—Just Better PackagedMedicine$100M federal bet on joint regeneration—what the trials can (and can’t) proveAIGitHub’s Copilot data grab: opt-out or be trainedMedicineRNA Sequencing UnifiesAIAI’s dirty little secret: secure by default is a mythSpaceEarth Formed From Inner Solar SystemAI$70M for AI code verification—because shipping works, not just generating itSpaceYouTube’s AI cloning tool exposes a deeper problemAIAI traffic now outpaces humans—but who’s really winning?SpaceSmile Mission to X-Ray Earth’s Magnetic ShieldAIGemini Live’s voice downgrade: AI progress or collateral damage?SpaceGamma Cas’s X-Ray Mystery Solved After 40 YearsGamingNvidia’s AI art war: Why players are sharpening the pitchforksSpaceUK’s AI probe into Microsoft isn’t just about Windows—it’s about controlTechnologyLeaked iPhone hacking tool exposes Apple’s zero-click blind spot
⊞ Foto Review