Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware

North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware

Posted on November 28, 2025November 28, 2025 By CWS

Nov 28, 2025Ravie LakshmananSupply Chain Assault / Malware
The North Korean risk actors behind the Contagious Interview marketing campaign have continued to flood the npm registry with 197 extra malicious packages since final month.
In line with Socket, these packages have been downloaded over 31,000 occasions, and are designed to ship a variant of OtterCookie that brings collectively the options of BeaverTail and prior variations of OtterCookie.

A number of the recognized “loader” packages are listed beneath –

bcryptjs-node
cross-sessions
json-oauth
node-tailwind
react-adparser
session-keeper
tailwind-magic
tailwindcss-forms
webpack-loadcss

The malware, as soon as launched, makes an attempt to evade sandboxes and digital machines, profiles the machine, after which establishes a command-and-control (C2) channel to supply the attackers with a distant shell, together with capabilities to steal clipboard contents, log keystrokes, seize screenshots, and collect browser credentials, paperwork, cryptocurrency pockets knowledge, and seed phrases.
It is value noting that the blurring distinction between OtterCookie and BeaverTail was documented by Cisco Talos final month in reference to an an infection that impacted a system related to a company headquartered in Sri Lanka after a person was probably deceived into working a Node.js utility as a part of a faux job interview course of.

Additional evaluation has decided that the packages are designed to connect with a hard-coded Vercel URL (“tetrismic.vercel[.]app”), which then proceeds to fetch the cross-platform OtterCookie payload from a risk actor-controlled GitHub repository. The GitHub account that serves because the supply automobile, stardev0914, is now not accessible.
“This sustained tempo makes Contagious Interview one of the crucial prolific campaigns exploiting npm, and it exhibits how totally North Korean risk actors have tailored their tooling to trendy JavaScript and crypto-centric growth workflows,” safety researcher Kirill Boychenko stated.

The event comes as faux assessment-themed web sites created by the risk actors have leveraged ClickFix-style directions to ship malware known as GolangGhost (aka FlexibleFerret or WeaselStore) beneath the pretext of fixing digicam or microphone points. The exercise is tracked beneath the moniker ClickFake Interview.

Written in Go, the malware contacts a hard-coded C2 server and enters right into a persistent command-processing loop to gather system data, add/obtain information, run working system instructions, and harvest data from Google Chrome. Persistence is achieved by writing a macOS LaunchAgent that triggers its execution by way of a shell script robotically upon person login.
Additionally put in as a part of the assault chain is a decoy utility that shows a bogus Chrome digicam entry immediate to maintain up the ruse. Subsequently, it presents a Chrome-style password immediate that captures the content material entered by the person and sends it to a Dropbox account.
“Though there’s some overlap, this marketing campaign is distinct from different DPRK IT Employee schemes that target embedding actors inside reputable companies beneath false identities,” Validin stated. “Contagious Interview, in contrast, is designed to compromise people by means of staged recruiting pipelines, malicious coding workout routines, and fraudulent hiring platforms, weaponizing the job utility course of itself.”

The Hacker News Tags:Deploy, Hackers, Korean, Malware, North, NPM, OtterCookie, Packages, Spread, Updated

Post navigation

Previous Post: French Soccer Federation Hit by Cyberattack, Member Data Stolen
Next Post: Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages

Related Posts

A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces The Hacker News
Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack The Hacker News
Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally The Hacker News
How To Browse Faster and Get More Done Using Adapt Browser How To Browse Faster and Get More Done Using Adapt Browser The Hacker News
Scattered Spider Hacker Gets 10 Years, M Restitution for SIM Swapping Crypto Theft Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft The Hacker News
New HTTP/2 ‘MadeYouReset’ Vulnerability Enables Large-Scale DoS Attacks New HTTP/2 ‘MadeYouReset’ Vulnerability Enables Large-Scale DoS Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News