A recently discovered form of malware steals browser cookies and other information on victims’ Apple Mac computers to steal cryptocurrencies.
Researchers at cybersecurity firm Palo Alto Networks published a report on Thursday, saying that the malware, dubbed “CookieMiner,” intercepts browser cookies related to cryptocurrency exchanges and wallet service providers’ websites visited by the victims.
It also tries to steal credit card information from major issuers, such as Visa, Mastercard, American Express and Discover, as well as saved usernames and passwords in Chrome, iPhone text messages that are backed up to iTunes and crypto wallet keys.
If successful at stealing those details, hackers can gain full access to victims’ crypto exchange and wallet accounts to steal funds.
The researchers explained:
“CookieMiner tries to navigate past the authentication process by stealing a combination of the login credentials, text messages, and web cookies.”
The malware has another string to its bow too – it changes a victim’s system configuration to maliciously load crypto mining software. The coinminer is similar to a variant that mines monero, but instead targets a lesser-known cryptocurrency called Koto, the researchers said.
The researchers suggested that cryptocurrency users should keep “an eye on their security settings and digital assets to prevent compromise and leakage.” They also noted that the malware checks if an application firewall program called Little Snitch is running on a victim’s computer. “If so, it will stop and exit,” they said
Monero is by far the most popular cryptocurrency among hackers, though. Last month, a study by college researchers showed that hackers have mined nearly 5 percent of the total monero in circulation.
Deployments of crypto-mining malware are rapidly growing in number. A study from McAfee, published in December, showed that there were nearly 4 million new mining malware threats in the third quarter of 2018 alone, compared to less than 500,000 in 2017 and 2016.