Friday, February 28, 2025
HomecryptocurrencyMac Malware Steals Cookies & saved Passwords when Users Visiting Crypto Exchange...

Mac Malware Steals Cookies & saved Passwords when Users Visiting Crypto Exchange Service Websites

Published on

SIEM as a Service

Follow Us on Google News

A new dangerous Mac Malware discovered that stealing the cookies when users visiting a website that belongs to cryptocurrency exchanges and wallet service along with saved credentials from Chrome Browers.

“Web cookies are widely used for authentication. Once a user logs into a website, its cookies are stored for the web server to know the login status. If the cookies are stolen, the attacker could potentially sign into the website to use the victim’s account.”

Cybercriminals using various crypto mining malware to steal the cryptocurrencies in the exchange platform, in this case, researchers believe that the malware developed by OSX.DarthMiner.

Attackers can able to access the victim’s crypto exchange wallet and steal the funds if the victims will be compromised by this Mac malware.

Also based on the attack scenario that steals login credentials, web cookies, and SMS data, attackers bypass the multi-factor authentication.

It named as “Cookieminer” based on the malware nature that steals the Browser cookies that associate with the crypto wallet and exchanges.

Mac Malware Infection process

Initially, An attackers can inject the shell script into targeting MacOS and steal the Safari browser’s cookies and uploaded into remote server.

Mac Malware

Also, the malware targeting widely used well-known crypto exchanges including Binance, Coinbase, Poloniex, Bittrex, Bitstamp, MyEtherWallet, and any website having “blockchain” in its domain name such as www.blockchain[.]com.

This Mac Malware Also Targeting Google Chrome browser where it steals the stored passwords using a python script called harmlesslittlecode.py” that helps attackers to extract saved login credentials and credit card information.

According to Palo Alto Networks, “CookieMiner adopts techniques from the Google Chromium project’s code for its decryption and extraction operations and abuses them. Google Chromium is an open-source version of the Google Chrome browser. By abusing these techniques, CookieMiner attempts to steal credit card information from major issuers, such as Visa, Mastercard, American Express”

Once the Mac malware collects the relevant information then it communicate with C&C Server and upload the entire stolen data.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...