Cookie Stealer Script [TRUSTED]

: Once the victim visits the compromised page or opens the malicious email, the script runs automatically in their browser.

: It sends the stolen cookies to a remote server controlled by the attacker via an HTTP GET or POST request. Consequences of a Successful Attack cookie stealer script

Joe Web Challenge — Google CTF 2017 | by Ons A. - codeburst : Once the victim visits the compromised page

: Once inside, the attacker can exfiltrate emails, personal documents, and financial information. the attacker can exfiltrate emails

: Attackers can impersonate the victim and log into their accounts (e.g., webmail, banking, or social media) without needing a password.

: Some scripts, like those used by the "Earth Wendigo" group, can append themselves to the victim's email signature to spread to other contacts. Prevention and Mitigation