By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
Tech News

North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware

By Viral Trending Content 4 Min Read
Share
SHARE

Nov 28, 2025Ravie LakshmananSupply Chain Attack / Malware

The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more malicious packages since last month.

According to Socket, these packages have been downloaded over 31,000 times, and are designed to deliver a variant of OtterCookie that brings together the features of BeaverTail and prior versions of OtterCookie.

Some of the identified “loader” packages are listed below –

  • bcryptjs-node
  • cross-sessions
  • json-oauth
  • node-tailwind
  • react-adparser
  • session-keeper
  • tailwind-magic
  • tailwindcss-forms
  • webpack-loadcss
DFIR Retainer Services

The malware, once launched, attempts to evade sandboxes and virtual machines, profiles the machine, and then establishes a command-and-control (C2) channel to provide the attackers with a remote shell, along with capabilities to steal clipboard contents, log keystrokes, capture screenshots, and gather browser credentials, documents, cryptocurrency wallet data, and seed phrases.

It’s worth noting that the blurring distinction between OtterCookie and BeaverTail was documented by Cisco Talos last month in connection with an infection that impacted a system associated with an organization headquartered in Sri Lanka after a user was likely deceived into running a Node.js application as part of a fake job interview process.

Further analysis has determined that the packages are designed to connect to a hard-coded Vercel URL (“tetrismic.vercel[.]app”), which then proceeds to fetch the cross-platform OtterCookie payload from a threat actor-controlled GitHub repository. The GitHub account that serves as the delivery vehicle, stardev0914, is no longer accessible.

“This sustained tempo makes Contagious Interview one of the most prolific campaigns exploiting npm, and it shows how thoroughly North Korean threat actors have adapted their tooling to modern JavaScript and crypto-centric development workflows,” security researcher Kirill Boychenko said.

The development comes as fake assessment-themed websites created by the threat actors have leveraged ClickFix-style instructions to deliver malware referred to as GolangGhost (aka FlexibleFerret or WeaselStore) under the pretext of fixing camera or microphone issues. The activity is tracked under the moniker ClickFake Interview.

CIS Build Kits

Written in Go, the malware contacts a hard-coded C2 server and enters into a persistent command-processing loop to collect system information, upload/download files, run operating system commands, and harvest information from Google Chrome. Persistence is achieved by writing a macOS LaunchAgent that triggers its execution by means of a shell script automatically upon user login.

Also installed as part of the attack chain is a decoy application that displays a bogus Chrome camera access prompt to keep up the ruse. Subsequently, it presents a Chrome-style password prompt that captures the content entered by the user and sends it to a Dropbox account.

“Although there is some overlap, this campaign is distinct from other DPRK IT Worker schemes that focus on embedding actors within legitimate businesses under false identities,” Validin said. “Contagious Interview, by contrast, is designed to compromise individuals through staged recruiting pipelines, malicious coding exercises, and fraudulent hiring platforms, weaponizing the job application process itself.”

You Might Also Like

SAP Selects TCS in 5-Year Deal to Transform its IT Landscape

9 Best Black Friday Laptop Deals (2025): MacBooks, Gaming Laptops, and More

As Irish SMEs expand globally, we’re seeing a rise in ‘micro-multinationals’

Level Up Your Desk: 10 Unique Tech Accessories for a Dream Setup

TruthScan vs. SciSpace: AI Detection Battle

TAGGED: Credential Theft, Cyber Security, Cybersecurity, Internet, JavaScript, Malware, North Korea, Remote Access, social engineering, supply chain attack
Share This Article
Facebook Twitter Copy Link
Previous Article 9 Best Black Friday Laptop Deals (2025): MacBooks, Gaming Laptops, and More
Next Article Pope Leo XIV calls for unity of the Christian world during Nicaea ceremony
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Countdown to Big Noon Saturday: How Pivotal is Beating Michigan to Ryan Day's Legacy?
Sports
Project Motor Racing Review – The Automobiles Are Back
Gaming News
Balancer unveils $8M reimbursement plan for LPs after the $128M V2 exploit
Crypto
UK’s Crypto Crackdown Begins: Exchanges Required To Collect Transaction Records By 2026
Crypto
Russian drone strikes hit Kyiv residential areas despite peace moves
World News
SAP Selects TCS in 5-Year Deal to Transform its IT Landscape
Tech News
Homebuyers prioritize pet-friendly features in pursuit of dream home
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Countdown to Big Noon Saturday: How Pivotal is Beating Michigan to Ryan Day's Legacy?

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Countdown to Big Noon Saturday: How Pivotal is Beating Michigan to Ryan Day's Legacy?
November 29, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?