

If only the username and password are stolen and used by a bad actor, the website may issue an alert or request additional authentication for a new login," said Unit 42 in a blog post on Thursday. "Stealing cookies is an important step to bypass login anomaly detection. If the cookies are stolen, the attacker could potentially sign into the website to use the victim's account. Once a user logs into a website, its cookies are stored for the web server to know the login status. Web cookies are widely used for authentication.

The malware also configures the system to load coinmining software on the system.
#Chrome password stealer for mac full
If successful, the attackers would have full access to the victim's exchange account and/or wallet and be able to use those funds as if they were the user themselves.

"By leveraging the combination of stolen login credentials, web cookies and SMS data, based on past attacks like this, we believe the bad actors could bypass multi-factor authentication for these sites," the researchers noted. It steals saved passwords in Chrome and iPhone text messages from iTunes backups on the tethered Mac. The malware named "CookieMiner" is capable of stealing browser cookies associated with mainstream cryptocurrency exchanges and wallet service websites visited by the victims, said Unit 42, an arm of Palo Alto Networks.
