Cybersecurity

Storm Malware: The $900 Tool Making MFA Irrelevant

April 7, 2026Source: TechRadar
Storm Malware: The $900 Tool Making MFA Irrelevant
Photo by Adi Goldstein / Unsplash
Kemal Sivri

Kemal Sivri

Cybersecurity & Science Reporter

A new turnkey malware called Storm is allowing rookie hackers to bypass multi-factor authentication by stealing session cookies for just $900 a month.

Reklam

For years, we’ve been told that Multi-Factor Authentication (MFA) is the ultimate shield for our digital lives. Whether it’s a code sent to your phone or an authenticator app, it felt like enough. However, a new threat known as the 'Storm' infostealer is proving that even our strongest locks can be bypassed if the thief has the right key—or in this case, the right cookie.

Cybersecurity researchers have recently identified a surge in the use of 'turnkey' malware that specializes in session cookie hijacking. Unlike traditional phishing that tries to steal your password, Storm goes after the session tokens stored in your browser. These tokens are what tell a website 'this user is already logged in,' allowing you to skip the MFA prompt. By stealing these, hackers can walk right into enterprise-grade accounts without ever needing your secondary code.

What’s particularly alarming for the tech community is the democratization of these attacks. This malware is being sold on the dark web for roughly $900 per month as a subscription service. This means that even 'rookie' hackers, who may lack the skills to develop their own exploits, can now launch sophisticated attacks against major corporations and high-value cryptocurrency wallets. It’s a 'cybercrime-as-a-service' model that is scaling faster than many IT departments can handle.

Dear Mobikolik readers, this development suggests that the era of relying solely on SMS or app-based MFA might be coming to an end. While these tools still stop 99% of bulk attacks, targeted strikes using session hijacking require more advanced defenses, such as hardware security keys (like YubiKeys) or shorter session durations. As the 'Storm' continues to brew, staying vigilant about the browser extensions you install and the links you click is more critical than ever.

Reklam

Comments (0)

Leave a Comment

Loading...

Be the first to comment.