PANews reported on June 6 that according to a disclosure by SlowMist team member @im23pds, the North Korean-backed APT group Lazarus has recently deployed an information theft tool called OtterCookie, targeting personnel in the financial and crypto industries to steal sensitive data such as browser credentials, macOS keychain passwords, and wallet private keys. Experts recommend being cautious of suspicious job invitations, avoiding running unknown files, and strengthening endpoint security protection.
Lazarus Group Uses New Malware OtterCookie to Target Cryptocurrency Industry Professionals
This article is machine translated
Show original
Source
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments
Share


