Slow Fog: North Korea's Lazarus is using a new type of spying Trojan called OtterCookie to launch targeted attacks against encryption practitioners.

On June 6, the latest intelligence from the SlowMist security team revealed that the North Korean Lazarus hacking group is using a new secret-stealing Trojan called OtterCookie to launch targeted attacks on cryptocurrencies and financial practitioners. Tactics include faking high-paying job interviews/investor interviews, using deepfake (Deepfake) videos to impersonate recruiters, and disguising malware as "coding quizzes" or "system update packages." Targets include browser-saved login credentials, passwords and digital certificates in macOS Keychain, and encrypted wallet information and private keys. SlowMist recommends that you be vigilant about unsolicited job offers/investment offers, require multiple verifications for remote interviews, do not run executable files from unknown sources, especially the so-called "technical test questions" or "update patches", strengthen the terminal protection (EDR), deploy antivirus software, and regularly check for abnormal processes.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)