Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware

Posted on October 17, 2025October 17, 2025 By CWS

Cybercriminals related to the North Korean menace group WaterPlum, often known as Well-known Chollima or PurpleBravo, have escalated their actions with a classy new malware pressure known as OtterCandy.

This cross-platform RAT and knowledge stealer represents a harmful evolution within the group’s capabilities, combining options from beforehand noticed malware households RATatouille and OtterCookie to create a stronger weapon for credential theft and system compromise.

The malware emerges as a part of WaterPlum’s ClickFake Interview marketing campaign, a misleading social engineering operation that masquerades as respectable job recruitment processes within the blockchain and cryptocurrency sectors.

Attackers create convincing faux firm web sites, reminiscent of BlockForgeX, which current seemingly genuine job purposes and interview processes to lure unsuspecting victims into downloading malicious software program beneath the guise of digital camera setup directions or driver updates.

ClickFake assault stream (Supply – NTT Safety)

NTT Safety researchers recognized OtterCandy as the newest addition to WaterPlum’s arsenal, noting its deployment throughout Home windows, macOS, and Linux platforms since July 2025.

The malware’s impression extends past particular person programs, as assaults have been noticed focusing on victims in Japan and different areas, demonstrating the menace group’s increasing world attain and ambitions.

Constructed utilizing Node.js, OtterCandy establishes communication with command-and-control servers by way of Socket.IO connections, enabling menace actors to execute a complete vary of malicious actions remotely.

The malware’s command construction reveals its subtle design, implementing features reminiscent of ‘imp’ for sweeping dwelling directories, ‘pat’ for pattern-based file searches, and ‘add’ for extracting system info, browser credentials, and cryptocurrency pockets information.

Superior Persistence and Evasion Mechanisms

OtterCandy demonstrates exceptional resilience by way of its multi-layered persistence technique that ensures continued operation even after detection makes an attempt.

ClickFix webpage (Supply – NTT Safety)

Whereas the malware usually depends on the previous DiggingBeaver element for preliminary persistence, it incorporates an impartial backup mechanism that mechanically restarts processes when interrupted.

This self-preservation characteristic makes use of JavaScript’s course of occasion dealing with to observe for SIGINT alerts:-

operate startChildProcess() {
const_0x4777b5 = fork(path[‘join’) (_dirname, ‘decode.js’), [], {
‘indifferent’: !![],
‘stdio’: ‘ignore’
});
_0x4777b5[‘unref’]();
}

course of[‘on’](‘SIGINT’, () => {
startChildProcess();
course of[‘exit’]();
});

The malware’s August 2025 replace launched enhanced anti-forensic capabilities, together with complete hint deletion features that take away registry entries, downloaded information, and non permanent directories.

This cleanup mechanism operates by way of the ‘ss_del’ command, systematically erasing proof of compromise whereas sustaining operational safety for the menace actors’ ongoing campaigns.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actors, Attack, ClickFake, Deploy, Interview, Leveraging, Malware, OtterCandy, Threat

Post navigation

Previous Post: Hackers Using AI to Automate Vulnerability Discovery and Malware Generation
Next Post: Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution

Related Posts

Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials Cyber Security News
Russian Hackers Attacking Government Entity Using Stealthy Living-Off-the-Land Tactics Cyber Security News
New EtherHiding Attack Uses Web-Based Attacks to Deliver Malware and Rotate Payloads Cyber Security News
Hackers Actively Exploiting Langflow RCE Vulnerability to Deploy Flodrix Botnet Cyber Security News
Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data Cyber Security News
Ransomware Actors Targeting Global Public Sectors and Critical Services in Targeted Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark