PANews reported on June 6 that according to @im23pds disclosure by SlowMist team members, Lazarus, an APT organization with a North Korean background, recently deployed an information theft tool called OtterCookie to target financial and crypto industry personnel and steal sensitive data such as browser credentials, macOS keychain passwords, and wallet private keys. Experts recommend beware of suspicious job invitations, avoid running unknown files, and strengthen endpoint security.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
The Lazarus group uses a new type of malware, OtterCookie, to target professionals in the encryption industry.
PANews reported on June 6 that according to @im23pds disclosure by SlowMist team members, Lazarus, an APT organization with a North Korean background, recently deployed an information theft tool called OtterCookie to target financial and crypto industry personnel and steal sensitive data such as browser credentials, macOS keychain passwords, and wallet private keys. Experts recommend beware of suspicious job invitations, avoid running unknown files, and strengthen endpoint security.