A new type of malware steals cookies from cryptocurrency exchanges and different data in an effort to hack user accounts, cybersecurity analysis team Palo Alto Networks reported on January. 31.
CookieMiner, a progression of OSX.DarthMiner, is a malware targets mac users, stealing saved Google Chrome passwords, iPhone SMS messages and iTunes backups on bound machines and additional.
Along with the cookies, the goal of the malware is to realize access to cryptocurrency exchange accounts. As per Palo Alto, the hackers assume a combination of the stolen data would enable them to bypass the multi-layer authentication that several exchange users set up to supply additional security.
“If in, the attackers would have full access to the victim’s exchange account and/or wallet and be ready to use those funds as if they were the user themselves,” the firm summarized.
As its name suggests, the malware additionally installs cryptocurrency mining features.
The discovery is just the newest malware to seek out cryptocurrency users as its victims. As Top Market Group has reported, multiple malicious entities have tried to take advantage of lax security setups so as to compromise novice crypto traders.
Earlier this month, separate analysis claimed that around 4.5 % of the circulating amount of altcoin Monero (XMR) had been mined using nefarious ways.
“Cryptocurrency owners ought to keep a watch on their security settings and digital assets to prevent compromise and leakage,” Palo Alto concluded about CookieMiner.
To know more on Cryptocurrency and Blockchain events, follow us on Facebook, YouTube, Twitter, LinkedIn, Reddit, Telegram, BitcoinTalk, and we are also on Medium now