<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cookie-Stealing — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cookie-stealing/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cookie-stealing/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mac Malware of 2019 Report</title><link>https://feed.craftedsignal.io/briefs/2024-01-mac-malware-2019/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mac-malware-2019/</guid><description>The Mac Malware of 2019 report details various Mac malware specimens and variants, including CookieMiner, a cryptominer that steals user cookies and passwords, likely to give attackers access to victims' online accounts and wallets; CookieMiner persists via launch agents and exfiltrates browser cookies to a remote C2 server.</description><content:encoded><![CDATA[<p>The &ldquo;Mac Malware of 2019&rdquo; report provides a comprehensive analysis of new Mac malware specimens and variants that emerged throughout the year. It covers various aspects, including infection vectors, persistence mechanisms, and the ultimate goals of the malware. One notable example is CookieMiner, a cryptominer that also steals user cookies and passwords, potentially granting attackers access to victims&rsquo; online cryptocurrency accounts and wallets. The report also mentions other malware families like Yort, Siggen, BirdMiner, Netwire, Mokes.B, and GMERA, some attributed to the Lazarus Group. This report is important for defenders as it highlights the evolving threat landscape targeting macOS and provides actionable insights for detection and prevention.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial infection vector is unknown, but suspected to be third-party store downloads.</li>
<li>The malware installs two launch agents via a shell script named <code>uploadminer.sh</code> to establish persistence. The script downloads property lists to <code>~/Library/LaunchAgents</code>.</li>
<li>The first launch agent (<code>com.apple.rig2.plist</code>) persists a cryptocurrency mining binary named <code>xmrig2</code>.</li>
<li>The second launch agent (<code>com.proxy.initialize.plist</code>) executes inline python commands, including a base64 encoded chunk of data, achieving persistence.</li>
<li>The <code>xmrig2</code> binary mines the Koto cryptocurrency, using the pool <code>koto-pool.work</code>.</li>
<li>The malware steals cookies from Safari by copying the <code>Cookies.binarycookies</code> file, zipping it, and exfiltrating it to <code>46.226.108.171</code>. The cookies are checked for cryptocurrency exchange association.</li>
<li>The malware downloads a Python script named <code>harmlesslittlecode.py</code> to extract saved login credentials and credit card information from Google Chrome.</li>
<li>Stolen data, including cookies and passwords, are used to bypass 2FA on cryptocurrency exchanges, granting attackers full control of victims&rsquo; accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful CookieMiner infection can lead to significant financial loss for victims. By stealing cookies, passwords, and potentially SMS data, attackers can bypass multi-factor authentication on cryptocurrency exchanges and wallets. This allows them to drain accounts and make unauthorized transactions. The report does not specify the number of victims or the exact financial impact, but it highlights the potential for substantial damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the creation of launch agents in <code>~/Library/LaunchAgents</code> that execute suspicious binaries or scripts, based on the persistence mechanism used by CookieMiner (Attack Chain steps 2-4).</li>
<li>Detect connections to known cryptocurrency mining pools, such as <code>koto-pool.work</code>, used by the <code>xmrig2</code> miner (IOC: domain).</li>
<li>Implement the Sigma rule &ldquo;Detect CookieMiner Cookie Stealing&rdquo; to identify exfiltration of Safari cookie files to the C2 server <code>46.226.108.171</code> (IOC: ip).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>macos</category><category>malware</category><category>cryptominer</category><category>cookie-stealing</category></item></channel></rss>