A newly discovered piece of malware has been causing serious steal threats to the Mac users. It is found out that the malware steals the web browser cookies and all the important credentials which is an attempt to withdraw digital funds from their accounts of Cryptocurrency exchange. The malware we have been talking about is the CookieMiner. As the name suggests, this particular malware has got the capability to steal all of the cookies that are related to the Cryptocurrency exchanges and has been specifically designed to target the Mac users. The latest malware is believed to be based on the DarthMiner, which is another type of similar malware dedicated to target the Mac users and has been detected in December last year.
CookieMiner has been uncovered by Palo Alto Networks’ Unit 42 security research team and they states that the malware secretly installs the coin mining software into the attacked Mac machines and without letting the users know about the incident going on secretly mine for the additional Cryptocurrency by grabbing the resources of the targeted Mac’s system. Considering the case of CookieMiner, the software is built towards the mining of a lesser known privacy oriented Cryptocurrency, known as “Koto” and mostly used in Japan.
The new Mac malware can steal both Google Chrome and Safari Browser cookies that are associated with popular Cryptocurrency exchanges, usernames and passwords saved in the web browser, Cryptocurrency wallet keys and data as well as iPhone’s messages of the victims’ which are stored in the iTunes backup. Moreover, it has been found out that CookieMiner targeted Coinbase, Binance, Bittrex, Poloniex, MyEtherWallet and all other websites having “blockchain” as its domain. With the stolen data it becomes easier for the attackers to bypass the two-factor authentication for the exchange sites.