Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

[contact-form-7 id="dd1f6aa" title="Newsletter"]
What's Hot

Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses

August 15, 2025

A new way to test how well AI systems classify text | MIT News

August 15, 2025

Pebble’s smartwatch is back: Pebble Time 2 specs revealed

August 15, 2025
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
Cyber Security

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

MichaBy MichaMay 12, 2025No Comments3 Mins Read
OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities


Understanding the Threat: North Korean Cyber Activities

Summary: North Korean cyber threat actors, particularly in the Contagious Interview campaign, have refined their tactics with the emergence of advanced malware like OtterCookie. This cross-platform tool is adept at stealing credentials and sensitive files from various browsers, highlighting the ongoing cybersecurity challenges organizations face against state-sponsored hacking.

The North Korean threat actors behind the Contagious Interview campaign are leveraging updated versions of malware known as OtterCookie, which possesses significant capabilities to extract credentials from web browsers and various files.

According to insights from NTT Security Holdings, the attackers have been meticulous in updating the malware, with versions v3 and v4 launched in February and April 2025, respectively.

Introduction to OtterCookie and WaterPlum

This malware variant, tracked by NTT under the designation WaterPlum, or CL-STA-0240, encompasses various aliases including DeceptiveDevelopment, Famous Chollima, and Tenacious Pungsan. Initially documented by NTT in September 2024, OtterCookie is typically delivered via a JavaScript payload embedded within malicious npm packages, hacked GitHub repositories, or fictitious video conferencing applications. Once deployed, it connects to an external server to execute commands on compromised systems.

New Modules and Enhanced Capabilities

OtterCookie v3 introduces a novel upload module that enables the transfer of specific file types—including environment variables, images, documents, text files, and cryptocurrency wallet recovery phrases—to an external server.

Building on its predecessor, OtterCookie v4 enhances functionality by incorporating additional modules for extracting credentials from Google Chrome and collecting data from browser extensions such as MetaMask and iCloud Keychain. Notably, this version can also detect execution environments in virtual machines from various providers.

Interestingly, while one module decrypts Chrome credential data, another gathers encrypted login credentials from browsers like Chrome and Brave, indicating a diversity in their developmental coding styles.

Monetizing Cybercrime: Redirecting IT Talent

As reported by Sophos, the landscape of North Korean cyber threats extends beyond malware. The fraudulent IT worker scheme—operating under names like Famous Chollima and Nickel Tapestry—targets organizations across Europe and Asia, seeking to redirect job earnings back to Pyongyang.

These cyber operatives generate fake profiles on platforms like LinkedIn, Upwork, and Toptal, often enhanced with AI-generated images and manipulated resumes. They maintain a semblance of normalcy via mouse jiggler utilities and VPN software, with some engaging in interactive Zoom calls to evade detection.

Proactive Defense Strategies

Organizations need to fortify their defenses against such sophisticated cyber tactics by implementing enhanced identity verification measures and keeping HR teams educated about the latest fraudulent schemes.

Integrating solutions that monitor for insider threats and usage anomalies can help detect malicious activities linked to fraudulent workers. Moreover, adopting geo-based login monitoring could provide an added layer of security, especially crucial in environments with Bring Your Own Device (BYOD) policies.

Final Thoughts: The Ongoing Cybersecurity Challenge

The evidence suggests the persistent threat of North Korean cyber operatives is evolving. As evidenced by several recent cyber activities—including the billion-dollar heist from the cryptocurrency platform Bybit—the stakes are high in the ongoing battle against cyber warfare.

Frequently Asked Questions

1. What is OtterCookie?

OtterCookie is a cross-platform malware developed by North Korean threat actors to steal credentials and sensitive data from web browsers.

2. How can organizations protect against North Korean cyber threats?

Implementing robust identity verification processes, continuous employee education, and monitoring for suspicious activity are critical strategies for safeguarding against these threats.

3. What tactics do North Korean hackers use to infiltrate organizations?

North Korean hackers often create fake profiles on job sites, use AI-generated images, and employ various tools to mimic legitimate IT workers to gain access to target organizations.



Read the original article

0 Like this
adds Capabilities Chrome Credential Detection MetaMask OtterCookie Theft
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleUse AI at work? You might be ruining your reputation, a new study finds
Next Article High Availability Proxmox clusters are amazing

Related Posts

Cyber Security

Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses

August 15, 2025
Cyber Security

Over $300 million in cybercrime crypto seized in anti-fraud effort

August 15, 2025
Gaming

The Battlefield 6 beta’s second weekend adds new playlists, and a Custom Search feature that’s missing the one thing we care about

August 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.