On Jan. 31, cybersecurity research team Palo Alto Networks reported that a new form of malware dubbed, CookieMiner steals cookies and other data from cryptocurrency and digital asset exchanges in an endeavor to hack user accounts.
A progression of OSX.DarthMiner, CookieMiner is a malware that primarily targets Mac users. It allegedly steals saved iPhone SMS messages, Google Chrome passwords, and iTunes backups on tethered machines and more.
It is to be noted that the goal of the malware is to gain access to cryptocurrency exchange accounts, along with the cookies. As per Palo Alto, the hackers presume a permutation of the stolen data would permit them to find a way around the multi-layer authentication that many exchange users set up to provide additional security.
The firm summarized that if the attempt turns out to be successful, the attackers would have full access to the victim’s cryptocurrency exchange account or wallet. Furthermore, the attacker would be able to use those funds as if they were the user themselves.
Interestingly, the malware also installs cryptocurrency mining features, which is also suggested by its name.
It is to be noted that the discovery is presently the latest malware to seek out cryptocurrency and digital asset users as its victims. As Koinpost has reported previously, multiple malicious entities have tried to take gain of careless security setups in order to compromise beginner cryptocurrency traders. Also, Koinpost recently reported about the Cryptopia exchange hack and Localbitcoins Hack.
Moreover, separate research asserted that around 4.5% of the circulating amount of Monero (XMR) cryptocurrency in the market, had been mined by means of reprehensible procedures.
Concluding about the CookieMiner, Palo Alto commented that cryptocurrency and digital asset owners are supposed to keep an eye on their security settings and virtual assets to put a stop to compromise and leakage.