🔥 Gate Post Ambassador Exclusive Posting Reward Task Round 4 Is Live!
Not yet a Gate Post Ambassador? Apply now 👉 https://www.gate.com/questionnaire/4937
Join the Ambassador Task and post daily from June 9 to June 15, get your posts rated, and share a $300 prize pool based on your ratings!
🎁 Reward Details:
S-Level Weekly Ranking Reward
Post every day for 7 days with an overall quality score above 90 to qualify for S-Level.
2 outstanding ambassadors will each receive a $50 trading fee rebate voucher.
A/B-Level Tiered Rewards
Based on the number of posts and their quality, ambassadors will
Slow Mist CISO: Beware of the new attack tool OtterCookie from the Lazarus APT organization
Gate News bot message, Slow Mist's Chief Information Security Officer (CISO) 23pds posted on social media, warning about a new type of attack tool from the Lazarus APT organization — OtterCookie.
Recently, Slow Fog received intelligence that the Lazarus APT (Advanced Persistent Threat) organization is using a new type of information-stealing malware called OtterCookie to launch targeted custom attacks against professionals in the finance and cryptocurrency industries.
Overview of Attack Methods: • Attackers disguise themselves as well-known companies, luring victims into video calls under the pretense of investment and fake interviews; • Use deepfake technology to forge the image of investors or interviewers, enhancing deception; • Inducing victims to download and run malicious programs disguised as "coding challenges" or "video software updates"; •Once executed, the OtterCookie malware begins to steal critical sensitive information.
The targets of theft include: •Login credentials stored in the browser; •Passwords and certificates stored in the macOS Keychain; •Locally stored encrypted assets, wallet information, and private key data.
Safety Recommendations: •Be cautious of any unverified investment, recruitment requests, or remote interview invitations; •Do not run binaries from unknown sources, especially so-called "challenge problems" or "upgrade patches"; • Strengthen terminal detection and response capabilities, install necessary antivirus software, and regularly check for abnormal communications and behaviors.