SlowMist: Lazarus hackers are using a new stealing Trojan, OtterCookie, to target cryptographic practitioners
06-06 02:52
Odaily News The SlowMist security team has issued a warning that the North Korean Lazarus hacker group is using a new stealing Trojan called OtterCookie to launch targeted attacks against cryptocurrency and financial practitioners. Attack methods include faking high-paying job interviews/investor negotiations, using deepfake videos to impersonate recruiters, and disguising malware as "programming test questions" or "system update packages." Theft targets include login credentials saved by browsers, passwords and digital certificates in macOS keychains, and encrypted wallet information and private keys. SlowMist recommends being vigilant about unsolicited job/investment invitations, requiring multiple verifications for remote interviews, and never running executable files of unknown origin, especially so-called "technical test questions" or "update patches." Strengthen terminal protection (EDR), deploy antivirus software, and regularly check for abnormal processes.
最热快讯
资讯热榜
日榜
周榜
Hyperliquid’s 50x leveraged BTC short position turned from loss to profit, with a floating profit of over $600,000
James Wynn wrote a long article about himself: He started playing with contracts in March, earned 8-digit profits from Meme coins, and lost 100 million in a week
BTC rebounded and broke through 102,000 USDT, and the 24-hour decline narrowed to 2.87%
SlowMist: Lazarus hackers are using a new stealing Trojan, OtterCookie, to target cryptographic practitioners
Abraxas Capital shorts mainstream currencies for hedging, with current floating profits exceeding $55 million
TRUMP wallet official website linked to account X for the second time