← Back to Pulse Feed
PULSE DETAIL
Between April 6-9, 2026, multiple obfuscated malicious npm packages were identified as variants of the OtterCookie infostealer attributed to North Korean threat actors. The campaign employs a two-layer distribution strategy where benign wrapper packages clone legitimate libraries like big.js while pulling malicious dependencies containing the actual payload. Five malicious packages were identified, each containing obfuscated JavaScript files that execute via postinstall hooks. The toolchain steals credentials, files including Solana wallets and environment configurations, and exfiltrates data to Vercel-hosted C2 infrastructure. On Linux systems, it establishes persistence through SSH backdoor installation. The infrastructure overlaps with documented OtterCookie operations and connects to broader DPRK campaigns including Contagious Interview and Contagious Trader, demonstrating continued evolution in North Korean software supply chain attacks targeting developers.
MITRE ATT&CK & Malware Families
MALWARE FAMILIES
OtterCookie
BeaverTail
InvisibleFerret
Koalemos
| TYPE | INDICATOR | DESCRIPTION | CREATED | |
|---|---|---|---|---|
| IPv4 | 144.172.110.228 | — | 2026-04-13 | |
| IPv4 | 107.189.22.20 | — | 2026-04-13 | |
| IPv4 | 144.172.110.132 | — | 2026-04-13 | |
| IPv4 | 144.172.110.96 | — | 2026-04-13 | |
| IPv4 | 144.172.116.22 | — | 2026-04-13 | |
| IPv4 | 144.172.93.169 | — | 2026-04-13 | |
| IPv4 | 144.172.93.253 | — | 2026-04-13 | |
| IPv4 | 144.172.99.248 | — | 2026-04-13 | |
| IPv4 | 144.172.99.81 | — | 2026-04-13 |