CookieMiner intercepts browser cookies related to cryptocurrency exchanges and wallet service providers’ websites visited by the victims.
Moreover, besides crypto exchanges, the malicious code also targets any website having “blockchain” in its domain name, the researchers found. It also tries to steal credit card information from major issuers, such as Visa, Mastercard, American Express and Discover, as well as saved usernames and passwords in Chrome, iPhone text messages that are backed up to iTunes and crypto wallet keys.
If successful at stealing those details, hackers can gain full access to victims’ crypto exchange and wallet accounts to steal funds.
The malware has another string to its bow too – it changes a victim’s system configuration to maliciously load crypto mining software. The coinminer is similar to a variant that mines monero, but instead targets a lesser-known cryptocurrency called Koto, the researchers said.
Every day we send out a free e-mail with the most important headlines of the last 24 hours.
Subscribe now