The Importance of Session Tokens in Cybersecurity

Have you ever experienced being hacked or having your online presence compromised? These days, online security breaches have become so common that the saying “It’s not when but how” is becoming cliché.
Recently, large YouTube channels such as Linus Tech Tips, (My Channel Was Deleted Last Night) have been victims of such attacks.
Passwords and two-factor authentication (MFA) have long been seen as the gold standard of online security, but they are not foolproof.
A growing threat known as session token hijacking can bypass these security measures entirely.

What are session tokens?

When you log into a website, your credentials are validated, and the site provides your web browser with a session token. This token allows your browser, applications and, by extension, you to stay logged in when you restart your browser and access the site again. This is convenient, as it means you don't have to type in your password every time you visit the site.

However, the session token is stored locally on your device, which means that anyone who gains access to your device could also obtain the token. This is precisely what happened to Linus Tech Tips, who were targeted by a malware attack. The attack gave the hacker an exact copy of the team's browsers, including locally saved passwords, cookies, and browser preferences, allowing them to export session tokens for every logged-in website.

How are session tokens exploited?

Linus Tech Tips made a mistake by downloading an email attachment that appeared to be a sponsorship offer from a potential partner. Although the email came from a legitimate-looking source, it contained malware that gave the hacker access to their browsers. To prevent such attacks, it is essential to, double-check file extensions, be cautious when downloading attachments, and be wary of files that do not behave as expected.

While it is easy to blame users for such attacks, it is also essential to consider the effectiveness of training and processes in organizations. If organizations provide rigorous training for their staff and have better processes, attacks like these can be avoided.

SAARA has been regularly updating our cybersecurity training and can help your staff too! If you’re concerned about your cybersecurity or want to conduct an audit of your current systems then get in touch here!

How can you protect yourself?

In a perfect world, disaster response processes should be in place to quickly lock down accounts and reset passwords in the event of an attack.

However, in the case of the team mentioned earlier, a lack of proper training and processes made this difficult. They used a system called Content Manager, which theoretically improves security by allowing specific channel access roles to various team members. However, this made the process of determining the attack vector more complicated.

Session token hijacking is a growing threat that can bypass traditional security measures. Organizations should provide proper training to their staff and ensure robust processes and defenses are in place for responding to attacks.

Cybersecurity threats continue to pose a significant risk to organizations, and it's crucial to take proactive measures to protect your data and systems. By implementing basic security hygiene and staying vigilant, you can enhance your organization's cybersecurity posture and mitigate the risk of cyber attacks.

If you need help improving your cybersecurity, consider reaching out to SAARA.

Our team of experts can assess your current security posture, identify vulnerabilities, and provide guidance to help keep your organization secure.

Contact us today to learn more about our cybersecurity services and how we can help you stay protected.

Previous
Previous

Lights, Camera, Learn: How video content can enhance your staff training

Next
Next

How eLearning Is Changing The Face Of Education And Training In New Zealand.