New 'OtterCookie' malware used to backdoor devs in fake job offers
North Korean threat actors are using new malware called OtterCookie in the Contagious Interview campaign that is targeting software developers.
Contagious Interview has been active since at least December 2022, according to researchers at cybersecurity company Palo Alto Networks. The campaign targets software developers with fake job offers to deliver malware such as BeaverTail and InvisibleFerret.
A report from NTT Security Japan notes that the Contagious Interview operation is now using a new piece of malware called OtterCookie, which was likely introduced in September and with a new variant appearing in the wild in November.
OtterCookie attack chain
Just like in the attacks documented by Palo Alto Networks' Unit42 researchers, OtterCookie is delivered via a loader that fetches JSON data and executes the ‘cookie’ property as JavaScript code.
NTT says that, even though BeaverTail remains the most common payload, OtterCookie has been seen in some cases either deployed alongside BeaverTail or on its own.
The loader infects targets through Node.js projects or npm packages downloaded from GitHub or Bitbucket. However, files built as Qt or Electron applications were also used recently.
![Overview of the latest Contagious Interview attacks](/images/2024/12/27/e56bfe8133a159a92d8bd666952462ac.jpg)
Once active on the target device, OtterCookie establishes secure communications with its command and control (C2) infrastructure using the Socket.IO WebSocket tool, and awaits for commands.
The researchers observed shell commands that perform data theft (e.g. collecting cryptocurrency wallet keys, documents, images, and other valuable information).
“The September version of OtterCookie already included a built-in functionality to steal keys related to cryptocurrency wallets,” NTT explains.
“For example, the checkForSensitiveData function used regular expressions to check for Ethereum private keys,” the researchers note, adding that this was changed with the November variant of the malware where this is achieved through remote shell commands.
The latest version of OtterCookie can also exfiltrate clipboard data to the threat actors, which may contain sensitive information.
Commands typically used for reconnaissance, like ‘ls’ and ‘cat’, were also detected, indicating the attacker’s intention to explore the environment and stage it for deeper infiltration or lateral movement.
The appearance of new malware and the diversification of the infection methods indicate that the threat actors behind the Contagious Interview campaign experiment with new tactics.
Software developers should try to verify information about a potential employer and be wary of running code on personal or work computers as part of a job offer that require coding tests.
source: BleepingComputer
Free security scan for your website
Top News:
![Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Found in Russia](/images/thumbnail/images/2024/12/27/672c2ace08cb8fcf95b84ac5db23b4f4_450x0.png)
Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Found in Russia
December 27, 2024![CISA orders federal agencies to secure Microsoft 365 tenants](/images/thumbnail/images/2024/12/18/d40580f11734a6880414549a3e5beadf_450x0.jpg)
CISA orders federal agencies to secure Microsoft 365 tenants
December 18, 2024![Recorded Future CEO applauds "undesirable" designation by Russia](/images/thumbnail/images/2024/12/19/97ec63e1b3d60691c8513d86206938f8_450x0.jpg)
Recorded Future CEO applauds "undesirable" designation by Russia
December 19, 2024![Five lesser known Task Manager features in Windows 11](/images/thumbnail/images/2024/12/25/e19f162939d4e3106743931e372ccb55_450x0.jpg)
Five lesser known Task Manager features in Windows 11
December 25, 2024![DDoS Attacks Surge as Africa Expands Its Digital Footprint](/images/thumbnail/images/2024/12/26/020a1abab4c42a6a1b0ee1352918c6d6_450x0.jpg)
DDoS Attacks Surge as Africa Expands Its Digital Footprint
December 26, 2024