Slow Fog: North Korea's Lazarus is using a new type of espionage Trojan called OtterCookie to launch targeted attacks against cryptocurrency practitioners
ChainCatcher message, the latest intelligence from the SlowMist security team indicates that the North Korean Lazarus hacker group is using a new type of espionage Trojan called OtterCookie to launch targeted attacks against cryptocurrency and financial professionals.The total methods include faking high-paying job interviews/investor meetings, using deepfake videos to impersonate recruiters, and disguising malware as "programming test questions" or "system update packages."The targets for theft include login credentials saved in browsers, passwords and digital certificates in the macOS Keychain, as well as cryptocurrency wallet information and private keys.SlowMist recommends being vigilant about unsolicited job/investment offers, requiring multi-factor authentication for remote interviews, avoiding running executable files from unknown sources, especially so-called "technical test questions" or "update patches," strengthening endpoint protection (EDR), deploying antivirus software, and regularly checking for abnormal processes.