top of page

North Korean Hackers Release Updated OtterCookie Malware via Malicious npm Packages

  • Nov 29, 2025
  • 2 min read

Key Findings


  • North Korean threat actors behind the Contagious Interview campaign have flooded the npm registry with 197 more malicious packages since last month

  • These packages have been downloaded over 31,000 times and are designed to deliver a variant of OtterCookie malware

  • The malware attempts to evade sandboxes and virtual machines, profiles the machine, and establishes a command-and-control (C2) channel to provide the attackers with remote shell access and capabilities to steal sensitive data


Background


  • The blurring distinction between OtterCookie and BeaverTail malware was documented by Cisco Talos last month in connection with an infection that impacted an organization in Sri Lanka

  • The packages are designed to connect to a hard-coded Vercel URL ("tetrismic.vercel[.]app"), which then proceeds to fetch the cross-platform OtterCookie payload from a threat actor-controlled GitHub repository


Malicious Packages


  • Some of the identified "loader" packages include bcryptjs-node, cross-sessions, json-oauth, node-tailwind, react-adparser, session-keeper, tailwind-magic, tailwindcss-forms, and webpack-loadcss

  • The malware, once launched, attempts to evade sandboxes and virtual machines, profiles the machine, and then establishes a command-and-control (C2) channel to provide the attackers with a remote shell, along with capabilities to steal clipboard contents, log keystrokes, capture screenshots, and gather browser credentials, documents, cryptocurrency wallet data, and seed phrases


Ongoing Campaigns


  • The Contagious Interview campaign is one of the most prolific campaigns exploiting npm, showing how North Korean threat actors have adapted their tooling to modern JavaScript and crypto-centric development workflows

  • Fake assessment-themed websites created by the threat actors have also leveraged ClickFix-style instructions to deliver malware referred to as GolangGhost (aka FlexibleFerret or WeaselStore) under the pretext of fixing camera or microphone issues


Threat Actor Attribution


  • The activity is tracked under the moniker ClickFake Interview and is distinct from other DPRK IT Worker schemes that focus on embedding actors within legitimate businesses under false identities

  • Contagious Interview is designed to compromise individuals through staged recruiting pipelines, malicious coding exercises, and fraudulent hiring platforms, weaponizing the job application process itself


Sources


  • https://thehackernews.com/2025/11/north-korean-hackers-deploy-197-npm.html

  • https://x.com/Dinosn/status/1994449828810530894

  • https://x.com/TheHackersNews/status/1994440919207362913

  • https://bvtech.org/north-korean-hackers-deploy-197-npm-packages-to-spread-updated-ottercookie-malware/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page