Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Inside Uzbekistan’s nationwide license plate monitoring system

Two Chrome extensions discovered to be secretly stealing credentials from over 170 sites

Interpol arrests 574 people in Africa. Ukrainian ransomware company pleads guilty

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware
Identity

North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

userBy userNovember 28, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 28, 2025Ravi LakshmananSupply chain attacks/malware

The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 additional malicious packages since last month.

According to Socket, these packages have been downloaded more than 31,000 times and are designed to provide a variant of OtterCookie that integrates functionality from BeaverTail and previous versions of OtterCookie.

Some of the identified “loader” packages are listed below.

bcryptjs-node cross-session json-oauth node-tailwind react-adparser session-keeper tailwind-magic tailwindcss-forms webpack-loadcss

DFIR retainer service

Once launched, the malware bypasses sandboxes and virtual machines, attempts to profile the machine, establishes a command-and-control (C2) channel, and provides the attacker with a remote shell, as well as the ability to steal clipboard contents, log keystrokes, capture screenshots, and collect browser credentials, documents, cryptocurrency wallet data, and seed phrases.

It is worth noting that the blurred distinction between OtterCookie and BeaverTail was documented by Cisco Talos last month in connection with an infection that affected systems associated with an organization headquartered in Sri Lanka, where users were likely tricked into running a Node.js application as part of a fake job interview process.

Further analysis revealed that the package was designed to connect to a hardcoded Vercel URL (‘tetrismic.vercel’).[.]app”) obtains cross-platform OtterCookie payloads from GitHub repositories controlled by threat actors. The GitHub account stardev0914, which acts as a delivery vehicle, will no longer be accessible.

“This sustained tempo makes Contagious Interview one of the most prolific campaigns exploiting npm, and shows how thoroughly North Korean threat actors have adapted their tools to modern JavaScript and cryptocentric development workflows,” said security researcher Kirill Boichenko.

This development occurred after a fake reputation-themed website created by a threat actor utilized ClickFix-style instructions to distribute malware called GolangGhost (also known as FlexibleFerret or WeaselStore) under the pretext of fixing camera and microphone issues. This activity is tracked under the name ClickFake Interview.

CIS build kit

The malware, written in Go, connects to a hardcoded C2 server and enters a persistent command processing loop to collect system information, upload/download files, execute operating system commands, and collect information from Google Chrome. Persistence is achieved by creating a macOS LaunchAgent that automatically triggers a shell script to run when a user logs in.

As part of the attack chain, a decoy application is also installed that displays a fake Chrome camera access prompt to continue the ruse. It then displays a Chrome-style password prompt and captures the content you type and sends it to your Dropbox account.

“While there is some overlap, this campaign is different from other North Korean IT worker programs that focus on integrating actors within legitimate companies under false identities,” Validin said. “In contrast, contagious interviews are designed to put individuals at risk through step-by-step hiring pipelines, malicious coding exercises, and fraudulent hiring platforms, weaponizing the job application process itself.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSoftBank remains as Meesho’s $606 million IPO becomes India’s first major e-commerce listing
Next Article Legacy Python bootstrap script creates domain takeover risk for multiple PyPI packages
user
  • Website

Related Posts

Two Chrome extensions discovered to be secretly stealing credentials from over 170 sites

December 23, 2025

Interpol arrests 574 people in Africa. Ukrainian ransomware company pleads guilty

December 23, 2025

Google Workspace password manager tutorial

December 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Inside Uzbekistan’s nationwide license plate monitoring system

Two Chrome extensions discovered to be secretly stealing credentials from over 170 sites

Interpol arrests 574 people in Africa. Ukrainian ransomware company pleads guilty

Google Workspace password manager tutorial

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.