Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware

Posted on October 17, 2025October 17, 2025 By CWS

Cybercriminals related to the North Korean menace group WaterPlum, often known as Well-known Chollima or PurpleBravo, have escalated their actions with a classy new malware pressure known as OtterCandy.

This cross-platform RAT and knowledge stealer represents a harmful evolution within the group’s capabilities, combining options from beforehand noticed malware households RATatouille and OtterCookie to create a stronger weapon for credential theft and system compromise.

The malware emerges as a part of WaterPlum’s ClickFake Interview marketing campaign, a misleading social engineering operation that masquerades as respectable job recruitment processes within the blockchain and cryptocurrency sectors.

Attackers create convincing faux firm web sites, reminiscent of BlockForgeX, which current seemingly genuine job purposes and interview processes to lure unsuspecting victims into downloading malicious software program beneath the guise of digital camera setup directions or driver updates.

ClickFake assault stream (Supply – NTT Safety)

NTT Safety researchers recognized OtterCandy as the newest addition to WaterPlum’s arsenal, noting its deployment throughout Home windows, macOS, and Linux platforms since July 2025.

The malware’s impression extends past particular person programs, as assaults have been noticed focusing on victims in Japan and different areas, demonstrating the menace group’s increasing world attain and ambitions.

Constructed utilizing Node.js, OtterCandy establishes communication with command-and-control servers by way of Socket.IO connections, enabling menace actors to execute a complete vary of malicious actions remotely.

The malware’s command construction reveals its subtle design, implementing features reminiscent of ‘imp’ for sweeping dwelling directories, ‘pat’ for pattern-based file searches, and ‘add’ for extracting system info, browser credentials, and cryptocurrency pockets information.

Superior Persistence and Evasion Mechanisms

OtterCandy demonstrates exceptional resilience by way of its multi-layered persistence technique that ensures continued operation even after detection makes an attempt.

ClickFix webpage (Supply – NTT Safety)

Whereas the malware usually depends on the previous DiggingBeaver element for preliminary persistence, it incorporates an impartial backup mechanism that mechanically restarts processes when interrupted.

This self-preservation characteristic makes use of JavaScript’s course of occasion dealing with to observe for SIGINT alerts:-

operate startChildProcess() {
const_0x4777b5 = fork(path[‘join’) (_dirname, ‘decode.js’), [], {
‘indifferent’: !![],
‘stdio’: ‘ignore’
});
_0x4777b5[‘unref’]();
}

course of[‘on’](‘SIGINT’, () => {
startChildProcess();
course of[‘exit’]();
});

The malware’s August 2025 replace launched enhanced anti-forensic capabilities, together with complete hint deletion features that take away registry entries, downloaded information, and non permanent directories.

This cleanup mechanism operates by way of the ‘ss_del’ command, systematically erasing proof of compromise whereas sustaining operational safety for the menace actors’ ongoing campaigns.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actors, Attack, ClickFake, Deploy, Interview, Leveraging, Malware, OtterCandy, Threat

Post navigation

Previous Post: Hackers Using AI to Automate Vulnerability Discovery and Malware Generation
Next Post: Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution

Related Posts

How SOC Teams Detect Can Detect Cyber Threats Quickly Using Threat Intelligence Feeds Cyber Security News
Threat actors Breach High Value targets like Google in Salesforce Attacks Cyber Security News
Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data Cyber Security News
“PupkinStealer” A New .NET-Based Malware Steals Browser Credentials & Exfiltrate via Telegram Cyber Security News
Cybercrime-as-a-Service – Countering Accessible Hacking Tools Cyber Security News
New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
  • PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution
  • Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT
  • Authorities Dismantle Cybercrime-as-a-Service Platform, Seize 40,000 Active SIM Cards
  • Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
  • PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution
  • Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT
  • Authorities Dismantle Cybercrime-as-a-Service Platform, Seize 40,000 Active SIM Cards
  • Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News