By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
Computing

North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware

News Room
Last updated: 2025/11/28 at 12:07 PM
News Room Published 28 November 2025
Share
North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
SHARE

Nov 28, 2025Ravie LakshmananSupply Chain Attack / Malware

The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more malicious packages since last month.

According to Socket, these packages have been downloaded over 31,000 times, and are designed to deliver a variant of OtterCookie that brings together the features of BeaverTail and prior versions of OtterCookie.

Some of the identified “loader” packages are listed below –

  • bcryptjs-node
  • cross-sessions
  • json-oauth
  • node-tailwind
  • react-adparser
  • session-keeper
  • tailwind-magic
  • tailwindcss-forms
  • webpack-loadcss
DFIR Retainer Services

The malware, once launched, attempts to evade sandboxes and virtual machines, profiles the machine, and then establishes a command-and-control (C2) channel to provide the attackers with a remote shell, along with capabilities to steal clipboard contents, log keystrokes, capture screenshots, and gather browser credentials, documents, cryptocurrency wallet data, and seed phrases.

It’s worth noting that the blurring distinction between OtterCookie and BeaverTail was documented by Cisco Talos last month in connection with an infection that impacted a system associated with an organization headquartered in Sri Lanka after a user was likely deceived into running a Node.js application as part of a fake job interview process.

Further analysis has determined that the packages are designed to connect to a hard-coded Vercel URL (“tetrismic.vercel[.]app”), which then proceeds to fetch the cross-platform OtterCookie payload from a threat actor-controlled GitHub repository. The GitHub account that serves as the delivery vehicle, stardev0914, is no longer accessible.

“This sustained tempo makes Contagious Interview one of the most prolific campaigns exploiting npm, and it shows how thoroughly North Korean threat actors have adapted their tooling to modern JavaScript and crypto-centric development workflows,” security researcher Kirill Boychenko said.

The development comes as fake assessment-themed websites created by the threat actors have leveraged ClickFix-style instructions to deliver malware referred to as GolangGhost (aka FlexibleFerret or WeaselStore) under the pretext of fixing camera or microphone issues. The activity is tracked under the moniker ClickFake Interview.

CIS Build Kits

Written in Go, the malware contacts a hard-coded C2 server and enters into a persistent command-processing loop to collect system information, upload/download files, run operating system commands, and harvest information from Google Chrome. Persistence is achieved by writing a macOS LaunchAgent that triggers its execution by means of a shell script automatically upon user login.

Also installed as part of the attack chain is a decoy application that displays a bogus Chrome camera access prompt to keep up the ruse. Subsequently, it presents a Chrome-style password prompt that captures the content entered by the user and sends it to a Dropbox account.

“Although there is some overlap, this campaign is distinct from other DPRK IT Worker schemes that focus on embedding actors within legitimate businesses under false identities,” Validin said. “Contagious Interview, by contrast, is designed to compromise individuals through staged recruiting pipelines, malicious coding exercises, and fraudulent hiring platforms, weaponizing the job application process itself.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Don’t Wait To Grab This Dell 15 Laptop Deal for 40% Off on Black Friday Don’t Wait To Grab This Dell 15 Laptop Deal for 40% Off on Black Friday
Next Article The Pod Coffee Makers I Use Every Day Are on Sale for Black Friday The Pod Coffee Makers I Use Every Day Are on Sale for Black Friday
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The nine TV channels disappearing from all Sky & Virgin Media boxes in December
The nine TV channels disappearing from all Sky & Virgin Media boxes in December
News
Nearly everyone you know is still using Facebook
Nearly everyone you know is still using Facebook
News
I Trust These Top Protein Powder Deals and Supplements Steals
I Trust These Top Protein Powder Deals and Supplements Steals
Gadget
I’ve Curated 70+ Black Friday Deals From Best Buy You Don't Want to Miss
I’ve Curated 70+ Black Friday Deals From Best Buy You Don't Want to Miss
News

You Might also Like

Terraformation vs. Paraterraforming: The Dream, The Science, The Illusion | HackerNoon
Computing

Terraformation vs. Paraterraforming: The Dream, The Science, The Illusion | HackerNoon

18 Min Read
Why Teams Need Packages — And How I Built an E-Commerce Package That Changed Our Workflow | HackerNoon
Computing

Why Teams Need Packages — And How I Built an E-Commerce Package That Changed Our Workflow | HackerNoon

7 Min Read
Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
Computing

Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages

5 Min Read
You Don’t Have a Prompt Problem. You Have a Context Problem. | HackerNoon
Computing

You Don’t Have a Prompt Problem. You Have a Context Problem. | HackerNoon

17 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?