Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    The AI Hype Index: AI-powered toys are coming

    June 27, 2025

    How to Schedule Incremental Backups Using rsync and cron

    June 27, 2025

    Hacker ‘IntelBroker’ charged in US for global data theft breaches

    June 27, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
    Cyber Security

    OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

    MichaBy MichaMay 12, 2025No Comments3 Mins Read
    OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities


    Understanding the Threat: North Korean Cyber Activities

    Summary: North Korean cyber threat actors, particularly in the Contagious Interview campaign, have refined their tactics with the emergence of advanced malware like OtterCookie. This cross-platform tool is adept at stealing credentials and sensitive files from various browsers, highlighting the ongoing cybersecurity challenges organizations face against state-sponsored hacking.

    The North Korean threat actors behind the Contagious Interview campaign are leveraging updated versions of malware known as OtterCookie, which possesses significant capabilities to extract credentials from web browsers and various files.

    According to insights from NTT Security Holdings, the attackers have been meticulous in updating the malware, with versions v3 and v4 launched in February and April 2025, respectively.

    Introduction to OtterCookie and WaterPlum

    This malware variant, tracked by NTT under the designation WaterPlum, or CL-STA-0240, encompasses various aliases including DeceptiveDevelopment, Famous Chollima, and Tenacious Pungsan. Initially documented by NTT in September 2024, OtterCookie is typically delivered via a JavaScript payload embedded within malicious npm packages, hacked GitHub repositories, or fictitious video conferencing applications. Once deployed, it connects to an external server to execute commands on compromised systems.

    New Modules and Enhanced Capabilities

    OtterCookie v3 introduces a novel upload module that enables the transfer of specific file types—including environment variables, images, documents, text files, and cryptocurrency wallet recovery phrases—to an external server.

    Building on its predecessor, OtterCookie v4 enhances functionality by incorporating additional modules for extracting credentials from Google Chrome and collecting data from browser extensions such as MetaMask and iCloud Keychain. Notably, this version can also detect execution environments in virtual machines from various providers.

    Interestingly, while one module decrypts Chrome credential data, another gathers encrypted login credentials from browsers like Chrome and Brave, indicating a diversity in their developmental coding styles.

    Monetizing Cybercrime: Redirecting IT Talent

    As reported by Sophos, the landscape of North Korean cyber threats extends beyond malware. The fraudulent IT worker scheme—operating under names like Famous Chollima and Nickel Tapestry—targets organizations across Europe and Asia, seeking to redirect job earnings back to Pyongyang.

    These cyber operatives generate fake profiles on platforms like LinkedIn, Upwork, and Toptal, often enhanced with AI-generated images and manipulated resumes. They maintain a semblance of normalcy via mouse jiggler utilities and VPN software, with some engaging in interactive Zoom calls to evade detection.

    Proactive Defense Strategies

    Organizations need to fortify their defenses against such sophisticated cyber tactics by implementing enhanced identity verification measures and keeping HR teams educated about the latest fraudulent schemes.

    Integrating solutions that monitor for insider threats and usage anomalies can help detect malicious activities linked to fraudulent workers. Moreover, adopting geo-based login monitoring could provide an added layer of security, especially crucial in environments with Bring Your Own Device (BYOD) policies.

    Final Thoughts: The Ongoing Cybersecurity Challenge

    The evidence suggests the persistent threat of North Korean cyber operatives is evolving. As evidenced by several recent cyber activities—including the billion-dollar heist from the cryptocurrency platform Bybit—the stakes are high in the ongoing battle against cyber warfare.

    Frequently Asked Questions

    1. What is OtterCookie?

    OtterCookie is a cross-platform malware developed by North Korean threat actors to steal credentials and sensitive data from web browsers.

    2. How can organizations protect against North Korean cyber threats?

    Implementing robust identity verification processes, continuous employee education, and monitoring for suspicious activity are critical strategies for safeguarding against these threats.

    3. What tactics do North Korean hackers use to infiltrate organizations?

    North Korean hackers often create fake profiles on job sites, use AI-generated images, and employ various tools to mimic legitimate IT workers to gain access to target organizations.



    Read the original article

    0 Like this
    adds Capabilities Chrome Credential Detection MetaMask OtterCookie Theft
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleUse AI at work? You might be ruining your reputation, a new study finds
    Next Article High Availability Proxmox clusters are amazing

    Related Posts

    Cyber Security

    Hacker ‘IntelBroker’ charged in US for global data theft breaches

    June 27, 2025
    Cyber Security

    Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options

    June 27, 2025
    Cyber Security

    A Future World Of AI-Driven Network Security Solutions

    June 25, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.