VoidStealer infostealer implements hardware breakpoint technique to extract Chrome v20_master_key
Updated:
· First: 22.03.2026 16:32
· 📰 1 src / 1 articles
A new infostealer malware named VoidStealer has been observed in the wild using a novel hardware breakpoint-based technique to bypass Chrome’s Application-Bound Encryption (ABE) and extract the v20_master_key directly from browser memory. The malware leverages a suspended Chrome process, attaches as a debugger, and sets hardware breakpoints on specific DLL instructions to capture the plaintext master key during browser startup decryption operations. This method does not require privilege escalation or code injection, making it stealthier than prior bypasses. VoidStealer, offered as malware-as-a-service since at least December 2025, is the first infostealer confirmed to use this technique in the wild, though it appears to be derived from the open-source ChromeKatz toolset ElevationKatz.