26 C
Jaipur
Saturday, October 24, 2020

Mac Malware Steals Cookies & saved Passwords from Cryto Wallets

Must read

8K TV: Samsung launches The 8K Festival with QLED 8K TVs

Samsung has launched 'The 8K Festival' under which its super premium QLED 8K TVs will be available at special prices with discounts. The...

iPhone 12 Users Can Now Download OS Updates Over 5G Data

Apple finally introduced 5G support with the launch of its latest iPhone 12 series. Now, as iPhones support high-speed 5G networks, the Cupertino tech...

Check Out Oppo Find X2 League of Legends Special Edition Right Here

After much anticipation, Chinese phone maker, Oppo unveiled the second generation of its Find X series, the Oppo Find X2 and Find X2 Pro,...

 

A new dangerous Mac Malware discovered that stealing the cookies when users visiting a website that belongs to cryptocurrency exchanges and wallet service along with saved credentials from Chrome Browers.

“Web cookies are widely used for authentication. Once a user logs into a website, its cookies are stored for the web server to know the login status. If the cookies are stolen, the attacker could potentially sign into the website to use the victim’s account.”

Cybercriminals using various crypto mining malware to steal the cryptocurrencies in the exchange platform, in this case, researchers believe that the malware developed by OSX.DarthMiner.

Attackers can able to access the victim’s crypto exchange wallet and steal the funds if the victims will be compromised by this Mac malware.

Also based on the attack scenario that steals login credentials, web cookies, and SMS data, attackers bypass the multi-factor authentication.

It named as “Cookieminer” based on the malware nature that steals the Browser cookies that associate with the crypto wallet and exchanges.

Mac Malware Infection process

Initially, An attackers can inject the shell script into targeting MacOS and steal the Safari browser’s cookies and uploaded into remote server.

Mac Malware

Also, the malware targeting widely used well-known crypto exchanges including Binance, Coinbase, Poloniex, Bittrex, Bitstamp, MyEtherWallet, and any website having “blockchain” in its domain name such as www.blockchain[.]com.

This Mac Malware Also Targeting Google Chrome browser where it steals the stored passwords using a python script called harmlesslittlecode.py” that helps attackers to extract saved login credentials and credit card information.

According to Palo Alto Networks, “CookieMiner adopts techniques from the Google Chromium project’s code for its decryption and extraction operations and abuses them. Google Chromium is an open-source version of the Google Chrome browser. By abusing these techniques, CookieMiner attempts to steal credit card information from major issuers, such as Visa, Mastercard, American Express”

Once the Mac malware collects the relevant information then it communicate with C&C Server and upload the entire stolen data.

Source link

- Advertisement -

More articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest article

8K TV: Samsung launches The 8K Festival with QLED 8K TVs

Samsung has launched 'The 8K Festival' under which its super premium QLED 8K TVs will be available at special prices with discounts. The...

iPhone 12 Users Can Now Download OS Updates Over 5G Data

Apple finally introduced 5G support with the launch of its latest iPhone 12 series. Now, as iPhones support high-speed 5G networks, the Cupertino tech...

Check Out Oppo Find X2 League of Legends Special Edition Right Here

After much anticipation, Chinese phone maker, Oppo unveiled the second generation of its Find X series, the Oppo Find X2 and Find X2 Pro,...

apple: Apple fixes 6 malicious apps posing as Adobe Flash installers – Latest News

The malicious apps masquerading as Adobe Flash installer are not going to go away anytime soon as Apple has once again fixed six more...