Windows 10 reached EOS (end of support) on October 14, 2025. For more information, see this article.

Search Support

Avoid support scams. We will never ask you to call or text a phone number or share personal information. Please report suspicious activity using the “Report Abuse” option.

Learn More

Security Report: Session Hijacking via BeEF Exploit & Token Theft

  • 1 reply
  • 2 have this problem
  • Last reply by Denys

Dear Mozilla Support Team, I am writing to report a significant security breach involving my Firefox browser that resulted in session hijacking my Firefox devloper browser email was ( [email removed]@gmail.com ) in panic log out form my account and reset the laptop now I don't have access to the data and the compromise of multiple high-value accounts (Discord, Rockstar, and Telegram). Incident Details: Date of Incident: February 2026 Primary Exploit Identified: BeEF (Browser Exploitation Framework) OS: Windows 11 Symptoms: allowing an unauthorized party identified as operating from an IP in Vietnam to bypass 2FA by stealing active session tokens. Despite having security measures in place, the attacker successfully: Accessed my saved Google passwords. Reset my Rockstar Games and Discord account passwords. Gained access to my Telegram account (which has since been deleted). Technical Observations: Standard scans with Windows Defender and Malwarebytes did not immediately detect the "infostealer" responsible, suggesting the use of "Living-off-the-Land" (LotL) scripts or a sophisticated browser-based hook that persisted even after clearing basic cache. I am reporting this to help Mozilla investigate how Firefox's cookie storage and session management can be further hardened against BeEF-style hooks and unauthorized token extraction.

Dear Mozilla Support Team, I am writing to report a significant security breach involving my Firefox browser that resulted in session hijacking my Firefox devloper browser email was ( ''[email removed]''@gmail.com ) in panic log out form my account and reset the laptop now I don't have access to the data and the compromise of multiple high-value accounts (Discord, Rockstar, and Telegram). Incident Details: Date of Incident: February 2026 Primary Exploit Identified: BeEF (Browser Exploitation Framework) OS: Windows 11 Symptoms: allowing an unauthorized party identified as operating from an IP in Vietnam to bypass 2FA by stealing active session tokens. Despite having security measures in place, the attacker successfully: Accessed my saved Google passwords. Reset my Rockstar Games and Discord account passwords. Gained access to my Telegram account (which has since been deleted). Technical Observations: Standard scans with Windows Defender and Malwarebytes did not immediately detect the "infostealer" responsible, suggesting the use of "Living-off-the-Land" (LotL) scripts or a sophisticated browser-based hook that persisted even after clearing basic cache. I am reporting this to help Mozilla investigate how Firefox's cookie storage and session management can be further hardened against BeEF-style hooks and unauthorized token extraction.

Modified by Denys

All Replies (1)

Hi,

Could you please share more details about what happened in Firefox? Are you saying that a third-party website managed to access other unrelated third-party websites' cookies without any specific permissions? If so, do you have any evidence of that?

Ask a question

You must log in to your account to reply to posts. Please start a new question, if you do not have an account yet.