Web session cookie theft is the act of stealing active authentication cookies from a user's browser to impersonate them or resume their logged in session without knowing their password. The attacker doesn't authenticate, they inherit "trust" that was already granted.
Attackers mainly use infostealer malware or malicious browser extensions to extract cookies from browsers. More advanced campaigns use phishing proxy tools to capture cookies after MFA is completed, then replay the session immediately.
This attack bypasses passwords and MFA entirely and often produces no login alerts. Security logs show a 'normal' session, making detection difficult while attackers quietly take over accounts and move laterally.
In mid-2025, a technique dubbed Cookie-Bite was identified where a malicious extension steals session cookies from Azure Entra ID (Microsoft identity). It bypassed MFA and granted persistent access to services like Microsoft 365, Outlook, Teams, SharePoint and OneDrive simply by replaying those cookies. Security controls were technically working, but irrelevant, because the attacker never re-authenticated. One of the critical consequences was that a persistent cookie’s 90-day validity meant that one theft can yield months of control.
SourceGet our entire attack repository in a single, offline-ready PDF guide, featuring 25+ real-world attacks.
See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central.
Read moreDiscover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months.
Read moreGet a clear, practical guide to understanding threats and strengthening your organization’s security.
Read more