PULSE NAME
Tracking an OtterCookie Infostealer Campaign Across npm
WHITE FAMOUS CHOLLIMA AlienVault 2026-04-13 Modified: 2026-04-13
9
IOCs
LOW VOLUME
Between April 6-9, 2026, multiple obfuscated malicious npm packages were identified as variants of the OtterCookie infostealer attributed to North Korean threat actors. The campaign employs a two-layer distribution strategy where benign wrapper packages clone legitimate libraries like big.js while pulling malicious dependencies containing the actual payload. Five malicious packages were identified, each containing obfuscated JavaScript files that execute via postinstall hooks. The toolchain steals credentials, files including Solana wallets and environment configurations, and exfiltrates data to Vercel-hosted C2 infrastructure. On Linux systems, it establishes persistence through SSH backdoor installation. The infrastructure overlaps with documented OtterCookie operations and connects to broader DPRK campaigns including Contagious Interview and Contagious Trader, demonstrating continued evolution in North Korean software supply chain attacks targeting developers.
MITRE ATT&CK & Malware Families
MALWARE FAMILIES
OtterCookie BeaverTail InvisibleFerret Koalemos
Indicators of Compromise (9)
All IPv4
TYPEINDICATORDESCRIPTIONCREATED
IPv4 144.172.110.228 2026-04-13
IPv4 107.189.22.20 2026-04-13
IPv4 144.172.110.132 2026-04-13
IPv4 144.172.110.96 2026-04-13
IPv4 144.172.116.22 2026-04-13
IPv4 144.172.93.169 2026-04-13
IPv4 144.172.93.253 2026-04-13
IPv4 144.172.99.248 2026-04-13
IPv4 144.172.99.81 2026-04-13