Malware, Data Security

North Korean hackers improve OtterCookie malware’s data theft abilities

Malware analysis

Researchers have uncovered significant updates to OtterCookie, a cross-platform malware tied to the North Korean-aligned Contagious Interview campaign, according to The Hacker News.

Japanese cybersecurity firm NTT Security Holdings observed the malwares continued development, with versions 3 and 4 released in early 2025. Tracked as part of the WaterPlum threat group, OtterCookie is distributed via deceptive methods including npm packages, fake videoconferencing applications, and trojanized repositories. OtterCookie v3 added a dedicated upload module to exfiltrate targeted files, such as documents, mnemonic phrases for cryptocurrency wallets, and environment variables, through an external server. This function previously relied on server-sent shell commands. Version 4 introduced further enhancements, including modules to extract credentials from Google Chrome and MetaMask browser extensions, and expanded support for virtual machine detection to avoid analysis. Researchers noted differences in coding style between modules, suggesting contributions from multiple developers. The campaign also employs a Go-based stealer disguised as a Realtek driver update for macOS, intended to extract system credentials. Another malware family, Tsunami-Framework, linked to the same campaign, includes keylogging, data theft, and botnet functionality.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds