The company Slowmist, working in the Web3 security field, warned of the new malicious software called OtterCookie, which is used by North Korean Lazarus hackers to attack people working in the field of cryptocurrencies and finance.

Hackers lure job seekers for interviews, convincing users to install a special communications program that contains malicious code. Ottercookie can extract accounting data, passwords, digital certificates and closed keys to cryptocurrency wallets saved in the browser. Attackers steal the confidential data of users, while it is especially easy for them to extract data from MacOS devices.

Slowmist analysts noted that such tactics are becoming more and more popular among hackers – they began to make large -scale exploits less and more likely and prefer more sophisticated methods based on social engineering. Slowmist said that OtterCookie could be the North Korean hacker group Lazarus, which in February has performed the largest cryptocurrency in the hacking of the BYBIT crypto -tank. Losses of exchanges are estimated at $ 1.5 billion.

Slowmist security experts called on cryptocurrency specialists to be careful when receiving offers or investments, especially if potential employers ask for any files when making video calls. Users should not run unknown files, especially if they are presented as “technical problems” or “updates packages”. It is also recommended to use antiviruses and regularly check the systems for abnormal activity.

In recent months, Lazarus hackers began to organize attacks on developers and infrastructure of wallets, including SOLANA and Exodus. In April, the Federal Bureau of Investigations (FBI), with the assistance of the Silent Push cybersecurity company, blocked the fake website of the Blocknovas fictitious company, which was registered by hackers in the United States.