Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WaterPlum’s New Malware Threatens VSCode Security

WaterPlum’s New Malware Threatens VSCode Security

Posted on March 19, 2026 By CWS

A hacking group linked to North Korea, known as WaterPlum, has launched a new malware threat named StoatWaffle. The group deploys this malware through compromised Visual Studio Code (VSCode) repositories, masquerading as legitimate blockchain projects to clandestinely access developer machines.

Background on WaterPlum’s Campaign

WaterPlum has been orchestrating a campaign called “Contagious Interview,” which lures victims into executing harmful code under the guise of job interviews. The operation is divided among various teams, with Team 8, also known by the aliases Moralis and Modilus, spearheading the latest attacks.

Historically, Team 8 relied on a malware strain called OtterCookie. However, they transitioned to using StoatWaffle from December 2025, indicating a significant enhancement in their attack methodology.

Technical Insights into StoatWaffle

Security experts from NTT Security discovered StoatWaffle during an analysis of Team 8’s activities. Their report, released on March 17, 2026, describes StoatWaffle as a modular framework built on Node.js. It operates in stages, featuring a loader, a credential-stealing module, and a remote access trojan (RAT) component, which function together to grant attackers extensive access to infiltrated systems.

The attack initiates with a seemingly authentic blockchain project repository, strategically placed for developers to find. Inside, a .vscode folder with a tasks.json file is configured to execute upon folder opening, requiring no further action from the developer.

Potential Impact and Protective Measures

The threat posed by StoatWaffle is particularly severe because developers are unlikely to suspect that merely opening a VSCode project could automatically trigger a malware infection without manual script execution or prompts.

Upon execution, the malware reaches out to a Vercel-hosted web app to download a batch script, which silently installs Node.js if absent, removing a technical barrier. Subsequently, it downloads a JavaScript file acting as part of the infection chain.

Once active, StoatWaffle deploys its Stealer and RAT modules, targeting browser credentials, cryptocurrency wallet data, and more, while the RAT module awaits commands from a C2 server, granting attackers extensive control.

Developers should be cautious about trusting unverified VSCode repositories, especially those related to blockchain. Security settings should be reviewed, and suspicious behavior should be monitored.

For continued updates, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google for more insights.

Cyber Security News Tags:Blockchain, C2 Server, Contagious Interview, credential theft, Cybersecurity, Hacking, Malware, Node.js, remote access trojan, StoatWaffle, supply chain attack, Team 8, VSCode, WaterPlum

Post navigation

Previous Post: CISA Alerts on Zimbra, SharePoint Vulnerabilities
Next Post: Critical SharePoint Flaw Exploited in Cyber Attacks

Related Posts

Post-Quantum Cryptography What CISOs Need to Know Post-Quantum Cryptography What CISOs Need to Know Cyber Security News
New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections Cyber Security News
Authorities Arrested Admins Of “LockerGoga,” “MegaCortex,” And “Nefilim” Ransomware Gands Authorities Arrested Admins Of “LockerGoga,” “MegaCortex,” And “Nefilim” Ransomware Gands Cyber Security News
Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code Cyber Security News
Flickr Security Breach Exposes User Data Flickr Security Breach Exposes User Data Cyber Security News
Kali Linux 2025.3 Released With New Features and 10 New Hacking Tools Kali Linux 2025.3 Released With New Features and 10 New Hacking Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Raven Secures $20M to Enhance Cloud Security Solutions
  • Enhancing Security with Ceros for Claude Code
  • Iran-Linked Botnet Unveiled Through Open Directory Leak
  • CISA Highlights SharePoint Security Vulnerability Exploitation
  • DarkSword iOS Kit Exploits Multiple Flaws for Device Control

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Raven Secures $20M to Enhance Cloud Security Solutions
  • Enhancing Security with Ceros for Claude Code
  • Iran-Linked Botnet Unveiled Through Open Directory Leak
  • CISA Highlights SharePoint Security Vulnerability Exploitation
  • DarkSword iOS Kit Exploits Multiple Flaws for Device Control

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark