BlockBeats News, June 6th, the latest intelligence from the SlowMist Security Team shows that the North Korean Lazarus hacking group is using a new stealthy information-stealing trojan called OtterCookie to launch targeted attacks against cryptocurrency and financial professionals.
The tactics involved include forging high-paying job interview/investor talks, using deepfake videos to impersonate the recruiting party, and disguising malware as "programming test questions" or "system update packages."
The targets for theft include browser-stored login credentials, passwords and digital certificates in the macOS Keychain, as well as cryptocurrency wallet information and private keys.
SlowMist advises to remain vigilant against actively provided job/investment invitations, conduct multi-factor authentication for remote interviews, avoid running executable files of unknown origin, especially those disguised as "technical test questions" or "update patches," strengthen endpoint defense (EDR), deploy antivirus software, and regularly check for unusual processes.
免责声明:投资有风险,本文并非投资建议,以上内容不应被视为任何金融产品的购买或出售要约、建议或邀请,作者或其他用户的任何相关讨论、评论或帖子也不应被视为此类内容。本文仅供一般参考,不考虑您的个人投资目标、财务状况或需求。TTM对信息的准确性和完整性不承担任何责任或保证,投资者应自行研究并在投资前寻求专业建议。