Monday, April 28, 2025
HomeCyber AttackNew 'OtterCookie' Malware Attacking Software Developers Via Fake Job Offers

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Published on

SIEM as a Service

Follow Us on Google News

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack targeting various organizations, unlike typical nation-sponsored attacks. 

While primarily associated with BeaverTail and InvisibleFerret malware, SOCs have recently observed OtterCookie deployed within this campaign. 

OtterCookie exhibits distinct behavior from its predecessors, demonstrating the campaign’s evolution and expanding threat landscape, which highlights the importance of continuous monitoring and threat intelligence updates for organizations to effectively mitigate the risks posed by Contagious Interview.

- Advertisement - Google News
Execution Flow

Contagious Interview attacks, which exploit vulnerabilities in software development processes, are increasingly originating from diverse sources. 

While Node.js projects and npm packages remain common attack vectors, attackers are now targeting applications built with Qt and Electron frameworks, which demonstrates active experimentation by attackers to identify and exploit new vulnerabilities in the software supply chain.

Previous research documented loaders that fetch JSON data, extract a “cookie” property, and execute it as JavaScript code, as a similar pattern where loaders download JavaScript code directly, triggering a 500 HTTP status code and executing the code within the resulting catch block. 

This loader primarily delivers BeaverTail malware, though OtterCookie infections have been noted and also encountered instances of simultaneous OtterCookie and BeaverTail executions.

JavaScript code

OtterCookie, a malware observed in November 2024, uses Socket.IO for remote communication and can execute shell commands (command) and steal device information (whour) upon receiving remote commands via the socketServer function. 

Analysis of the commands sent through the socketServer function revealed that OtterCookie collects cryptocurrency wallet keys from document, image, and cryptocurrency-related files and sends them to a remote server by using ls and cat commands for environment reconnaissance. 

shell commands

The OtterCookie version that was released in November has improved capabilities for stealing cryptocurrency keys in comparison to the version that was released in September. 

While both versions can steal keys, November leverages remote shell commands for this purpose, whereas September relies on regular expression-based checks within the `checkForSensitiveData` function. 

November introduces clipboard monitoring functionality using the `clipboardy` library to exfiltrate sensitive data from the victim’s device to a remote location, a feature absent in the September OtterCookie.

According to NTT, contagious Interview, a threat actor group, has deployed a new malware variant called OtterCookie, which targets and steals browser cookies, potentially compromising user accounts. 

The attack vector remains under investigation, but the threat actor is actively evolving its tactics, as researchers have observed attacks in Japan, indicating a broadening geographical scope. 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...