CookieMiner is the latest malware discovered on Mac: it steals your banking details and also takes advantage of your power without you noticing

Apple Servers

As you have probably been told at some point, although it is true that macOS is not as vulnerable to threats as other competing operating systems can be, the truth is that it is not extremely safe either, since there are also viruses and malware, only which in this case are discovered to a lesser extent since there are not so many attacks.

We have on this occasion as proof of this to "CookieMiner", the latest malware that has been discovered for Mac, thanks to which just by browsing through the network your data could be compromised, to which we must add that it is possible that they take advantage of the power of your Mac to earn money with it.

This is CookieMiner, the latest malware discovered on macOS

In this case, as we have learned thanks to the latest information provided by TNW, apparently at present there is a new malware that is mainly affecting users who use the Google Chrome browser on their Mac computers, as it is a simple cookie that is stored in the browser, and that, to begin with, what it does is access passwords and data that you have stored, being a serious problem if, for example, you have the bank details saved to be used with autocompletion.

But that's not all, because when it has just fully installed, "CookieMiner" takes advantage of your computer to mine cryptocurrency, thereby obtaining benefits thanks to your Mac, to which we must add that, if you have previously mined cryptocurrency on your computer, it will try to steal the benefits in question, or at least this is how The Next Web has described it:

Security researchers from Palo Alto Networks Unit 42 have identified new malware that steals cryptocurrencies. It's been dubbed "CookieMiner," and it specifically targets Mac users and cookies related to their login credentials for cryptocurrency exchanges like Coinbase, Binance, Poloniex, Bittrex, Bitstamp, and MyEtherWallet.

It also tries to steal passwords saved in Chrome, and while it is true that having a person's login credentials is usually not enough to access their account if they have two-factor authentication enabled, if the hacker also has their cookies authentication, you can use them to make the login attempt appear as if you were connected to a previously verified session. In this way, the website will not request that the login attempt be authenticated, allowing access to the account.

As you may have seen, in this case we are dealing with quite dangerous macOS malware, because as you may have seen it manages to have access to the entire system practically to take advantage of it. Most likely, from Apple, they will soon release a new update with a security patch, but in the meantime what you should do is look at the cookies that your browser uses and what the websites you access store, because this is how you can keep everything as secure as it has been up to now, taking into account that not even the Using two-step authentication works this time.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.