Unit 42 Finds New MacOS Mining Malware ‘CookieMiner’ Uses Your Cookies to Steal Your Crypto

A new kind of malware is attacking MacOS user now. As reported by The Next Web’s Hard Fork, the researchers from Palo Alto Network’s Unit 42 have discovered a new threat for crypto users.

This new kind of malware has been called “CookieMiner” and it targets specifically Mac users instead of the most common victim, Windows users. Basically, the malware steals your cookies related to logon credentials and then use it to steal your money from wallets and exchanges. Companies like Bitstamp, Coinbase, Poloniex, Binance and MyEtherWallet are among the main victims.

According to the reports, the new malware was uncovered after the researchers examined OSX.DarthMiner, which appeared last year. Jen Miller-Osborn, the deputy director of threat intelligence at Unit 42 has affirmed that it was a new variant that called the attention of the team.

He affirmed that the malware was able to steal passwords from Chrome and text messages stored in iTunes as well. The attackers would then use all the information that was stolen from the user in order to get their cryptos.

The problem with cookies is that only login credentials are not enough if you have 2-factor authentication enabled. Unfortunately, with cookies, one could make the login attempts look as if they were made before, so 2FA would not be required in order to steal the money.

Old Schools Methods Used For Crypto

Miller-Osborn believes that this is a big proof that the hackers are now using oldschool methods in order to steal the cryptos from their victims, as stealing cookies is not necessarily the newest strategy in the world. However, these methods are tweaked in order to serve this new objective.

The program is even sneakier than it seems. It installs coin mining software on the victim’s computer, so it is able to steal from the person twice. First, it steals the tokens and then the power from the person.

According to the reports made by the team, the crypto jacking software is similar to a XMRIG coin miner which is used to mine the favorite token of criminals, Monero, which is generally choosen because it is impossible to track. However, this version mines Koto, a very small and almost irrelevant Japanese altcoin. Koto is a privacy coin as well, though, as it would be expected.

At the moment, the team was not able to determine who was behind the threat. The team believes, because of the Koto tokens being mined, that it might have some relationship with Japanese hackers but it is still too early to tell.

The most common ways to protect yourself from this kind of threat, the unit believes, is to never use credit card information within your browser, as this is one of the most common attack vectors that the criminals use to steal the money.

Also, clearing your web cache regularly could also be a very useful way to protect yourself from problems that might arise from having your cookies stolen.

Get Daily Headlines

Enter Best Email to Get Trending Crypto News & Bitcoin Market Updates

What to Know More?

Join Our Telegram Group to Receive Live Updates on The Latest Blockchain & Crypto News From Your Favorite Projects

Join Our Telegram

Stay Up to Date!

Join us on Twitter to Get The Latest Trading Signals, Blockchain News, and Daily Communication with Crypto Users!

Join Our Twitter

Add comment

E-mail is already registered on the site. Please use the Login form or enter another.

You entered an incorrect username or password

Sorry, you must be logged in to post a comment.
Bitcoin Exchange Guide