The latest intelligence from the Slow Mist security team shows that the North Korean Lazarus hacker group is using a new type of theft Trojan called OtterCookie to launch targeted attacks against cryptocurrency and financial practitioners. Total tactics include faking high-paying job interviews/investor talks, using depth fake videos to impersonate recruiters, and disguising malicious software as "programming test questions" or "system update packages." The targets include login credentials saved by the browser, passwords and digital certificates in the macOS keychain, as well as encrypted wallet information and private keys. SlowMist advises to be vigilant about unsolicited job offers/investment offers, remote interviews require multiple verifications, do not run executable files of unknown origin, especially so-called "technical test questions" or "update patches", strengthen end point protection (EDR), deploy antivirus software and regularly troubleshoot abnormal processes.
Web3 Desktop Trading Tool
Stay ahead of the game in the cryptocurrency space.