InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware
Technology

North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

November 29, 2025 4 Min Read
Share
North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware
SHARE

The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 additional malicious packages since last month.

According to Socket, these packages have been downloaded more than 31,000 times and are designed to provide a variant of OtterCookie that integrates functionality from BeaverTail and previous versions of OtterCookie.

Some of the identified “loader” packages are listed below.

  • bcryptjs node
  • cross session
  • json-oauth
  • Node tailwind
  • react ad parser
  • session keeper
  • Tailwind magic
  • tailwindcss form
  • webpack-loadcss

Once launched, the malware bypasses sandboxes and virtual machines, attempts to profile the machine, establishes a command-and-control (C2) channel, and provides the attacker with a remote shell, as well as the ability to steal clipboard contents, log keystrokes, capture screenshots, and collect browser credentials, documents, cryptocurrency wallet data, and seed phrases.

It is worth noting that the blurred distinction between OtterCookie and BeaverTail was documented by Cisco Talos last month in connection with an infection that affected systems associated with an organization headquartered in Sri Lanka, where users were likely tricked into running a Node.js application as part of a fake job interview process.

Further analysis reveals that these packages are designed to connect to a hard-coded Vercel URL (“tetrismic.vercel(.)app”) and then retrieve a cross-platform OtterCookie payload from a threat actor-controlled GitHub repository. The GitHub account stardev0914, which serves as a distribution vehicle, is no longer accessible.

“This sustained tempo makes Contagious Interview one of the most prolific campaigns exploiting npm, and shows how thoroughly North Korean threat actors have adapted their tools to modern JavaScript and cryptocentric development workflows,” said security researcher Kirill Boichenko.

See also  Samsung zero-click vulnerability exploited to deploy LANDFALL Android spyware via WhatsApp

This development occurred after a fake reputation-themed website created by a threat actor utilized ClickFix-style instructions to distribute malware called GolangGhost (also known as FlexibleFerret or WeaselStore) under the pretext of fixing camera and microphone issues. This activity is tracked under the name ClickFake Interview.

The malware, written in Go, connects to a hardcoded C2 server and enters a persistent command processing loop to collect system information, upload/download files, execute operating system commands, and collect information from Google Chrome. Persistence is achieved by creating a macOS LaunchAgent that automatically triggers execution by a shell script when a user logs in.

As part of the attack chain, a decoy application is also installed that displays a fake Chrome camera access prompt to continue the ruse. It then displays a Chrome-style password prompt and captures the content you type and sends it to your Dropbox account.

“While there is some overlap, this campaign is different from other North Korean IT worker programs that focus on integrating actors within legitimate companies under false identities,” Validin said. “In contrast, contagious interviews are designed to put individuals at risk through step-by-step hiring pipelines, malicious coding exercises, and fraudulent hiring platforms, weaponizing the job application process itself.”

Share This Article
Twitter Copy Link
Previous Article Get NordVPN for free with a Saily eSIM plan this Black Friday Get NordVPN for free with a Saily eSIM plan this Black Friday
Next Article US suspends all asylum decisions after National Guard shooting US suspends all asylum decisions after National Guard shooting

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Quantum Hacks to AI Defenses
Technology

From quantum hacks to AI defense – an expert guide to building unbreakable cyber resilience

7 Min Read
North Korean hacker lures defense engineer with fake job to steal drone secrets
Technology

North Korean hacker lures defense engineer with fake job to steal drone secrets

4 Min Read
China-linked APT31 launches stealth cyber attack on Russian IT using cloud services
Technology

China-linked APT31 launches stealth cyber attack on Russian IT using cloud services

5 Min Read
DeskRAT Malware Campaign
Technology

APT36 targets Indian government with Golang-based DeskRAT malware campaign

8 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?