North Korea’s OtterCookie Malware: A Recipe for Software Developer Chaos
North Korea-linked actors are using OtterCookie malware to lure software developers with fake job offers in the Contagious Interview campaign. This sneaky operation, active since 2022, involves downloading malware-laden projects from platforms like GitHub. Beware of any job offer that’s too good to be true—it might just be a cookie monster!

Hot Take:
Looks like North Korea’s latest malware campaign is spreading faster than gossip at a high school reunion! With the new OtterCookie malware, it seems these threat actors are trying to bake up some cyber mischief with a recipe of fake job offers and sneaky code. Someone should tell them that job hunting is already painful enough without having to dodge malware!
Key Points:
- North Korea-linked actors are using OtterCookie malware in the Contagious Interview campaign.
- The campaign targets software developers with fake job offers to spread the malware.
- OtterCookie, along with BeaverTail and InvisibleFerret, began appearing in November 2024.
- The malware exploits malicious Node.js projects or npm packages from GitHub or Bitbucket.
- Attackers are on the hunt for cryptocurrency wallet keys using shell commands.
Already a member? Log in here