In addition, it can be advised not only not to store passwords in browsers, but also to completely clear the entire browsing history and cookies when leaving them.
There is evidence that hackers have learned to extract passwords from cookies, as they are stored in the cache for some time (correct me again) and are not cleared immediately after visiting the site, which gives hackers time to get the password.
Credential-stealing malware is an integral part of the toolkit used by a wide variety of cybercriminals and other adversaries. While user account names and passwords are the most obvious targets of credential-stealing activities, the increased use of multi-factor authentication (MFA) to protect web-based services has reduced the effectiveness of that approach. Attackers are increasingly turning to stealing the “cookies” associated with credentials to clone active or recent web sessions—bypassing MFA in the process.
Cookie stealing: the new perimeter bypassThe reason for cookie theft is straightforward: Cookies associated with authentication to web services can be used by attackers in “pass the cookie” attacks, attempting to masquerade as the legitimate user to whom the cookie was originally issued and gain access to web services without a login challenge. This is similar to “pass the hash” attacks, which use locally stored authentication hashes to gain access to network resources without having to crack the passwords.