Researchers at Zscaler have identified a sophisticated new information-stealing malware, ChronoLeap, that employs a novel method to bypass time-based one-time password (TOTP) multi-factor authentication (MFA). The malware is distributed via malicious Google Ads pointing to trojanized installers for popular software. ChronoLeap uses a Browser-in-the-Browser (BitB) attack to present a fake login portal and capture credentials. Its key innovation is manipulating the victim's system clock to desynchronize it from the server, creating a larger window to use a stolen MFA token. This, combined with simultaneous session cookie theft, allows attackers to successfully hijack MFA-protected accounts. The malware is being sold on a Malware-as-a-Service (MaaS) basis, increasing its potential for widespread impact.
The ChronoLeap attack is a multi-stage process designed to defeat modern authentication controls:
T1566.002 - Phishing: Spearphishing Link: Although delivered via ads, the principle of luring a user to a malicious site is similar.T1189 - Drive-by Compromise: User is infected by downloading software from a malicious site.T1610 - Steal Application Access Token: The core of the session hijacking, stealing active session cookies.T1111 - Two-Factor Authentication Interception: The overall goal of the attack, achieved through a combination of techniques.T1564.006 - Hide Artifacts: Time-Based Evasion: A novel use of time manipulation not just for sandbox evasion, but for active attack purposes.ChronoLeap represents a significant evolution in credential theft, as it is specifically designed to defeat a security control (MFA) that many organizations rely on as a primary defense. A successful attack can lead to a full account takeover of critical cloud services. This grants attackers access to sensitive emails, documents, and corporate data, and can be used as a launchpad for further attacks within the organization, such as internal phishing or BEC scams. The MaaS model means that even low-skilled attackers can leverage this sophisticated tool, broadening the threat landscape.
timedate.cpl, w32tm.exe).D3-UGLPA: User Geolocation Logon Pattern Analysis and D3-PA: Process Analysis is required to correlate the suspicious login with the endpoint behavior.The most effective mitigation is to upgrade from TOTP/SMS to phishing-resistant MFA like FIDO2 hardware keys, which are not vulnerable to this type of interception.
Mapped D3FEND Techniques:
Educate users about the dangers of malvertising and downloading software from unofficial sources.
Use web filtering and ad-blocking technologies to prevent users from being exposed to malicious ads that lead to trojanized software.
Implement application allowlisting to prevent unknown and unauthorized executables from running on endpoints.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats