North Korean hackers use fake crypto app to steal seeds. Malware OtterCookie and BeaverTrail harvest keystrokes, screenshots and clipboard data. Victims lured with bogus job offers, assume hot wallets compromised. Hackers linked to North Korea have launched a new wave of cyberattacks targeting cryptocurrency users and developers. According to cybersecurity firm Cisco Talos, the attackers are using a malicious JavaScript payload hidden within a fake crypto application and an npm package to steal sensitive user data. The campaign, powered by the “OtterCookie” and “BeaverTrail” malware, has been described as highly organized and financially motivated. Victims are often lured with fake job offers or freelance gigs that appear legitimate. Once the victim downloads the infected application, the malware secretly installs itself on the system. It then begins collecting critical data such as keystrokes, screenshots, clipboard content, and wallet information from popular extensions like Metamask. Also Read: Solana (SOL) Price Prediction 2025–2030: Will SOL Break Past $250 After ETF Approval? How the Attack Works The infection starts when a user downloads the disguised crypto app, believing it to be a genuine tool. Hidden within the app is an obfuscated JavaScript payload that runs silently in the background. It steals files, login credentials, and even browser wallet details before uploading them to remote servers controlled by the attackers. Besides stealing sensitive data, the malware also collects seed phrases and passwords used to access crypto wallets. This allows the hackers to drain funds from hot wallets directly connected to the victim’s computer. As a result, cryptocurrency holders have become prime targets in this sophisticated campaign. Consequences and Recommended Actions Those who suspect exposure to the malware are advised to treat their wallets as compromised. Experts recommend moving funds immediately to new wallets and revoking token approvals from old ones. Additionally, reinstalling the operating system is considered one of the most effective ways to remove any lingering malware components. Users are urged to avoid running code from unverified sources or downloading unknown npm packages. When possible, new software should be tested within isolated environments such as virtual machines or containers. These precautions can significantly reduce the risk of infection. A Growing Cyber Threat Reports suggest that North Korean hackers have already stolen approximately $2 billion worth of cryptocurrency this year alone. Data from blockchain analytics firm Elliptic shows that the total value of stolen assets linked to the regime now stands at $6 billion. This underlines the scale of the threat posed by state-backed cybercrime. Cybersecurity specialists warn that these attacks are becoming more precise and harder to detect. Consequently, both individual crypto users and blockchain companies must remain vigilant. Strengthening security measures and monitoring unusual system activity remain vital steps in defending against future breaches. Also Read: Ripple CTO Clears Misconception About XRP Ledger’s Unique Node List The post North Korean Hackers Deploy New ‘OtterCookie’ Malware Through Fake Crypto Apps and npm Packages appeared first on 36Crypto. North Korean hackers use fake crypto app to steal seeds. Malware OtterCookie and BeaverTrail harvest keystrokes, screenshots and clipboard data. Victims lured with bogus job offers, assume hot wallets compromised. Hackers linked to North Korea have launched a new wave of cyberattacks targeting cryptocurrency users and developers. According to cybersecurity firm Cisco Talos, the attackers are using a malicious JavaScript payload hidden within a fake crypto application and an npm package to steal sensitive user data. The campaign, powered by the “OtterCookie” and “BeaverTrail” malware, has been described as highly organized and financially motivated. Victims are often lured with fake job offers or freelance gigs that appear legitimate. Once the victim downloads the infected application, the malware secretly installs itself on the system. It then begins collecting critical data such as keystrokes, screenshots, clipboard content, and wallet information from popular extensions like Metamask. Also Read: Solana (SOL) Price Prediction 2025–2030: Will SOL Break Past $250 After ETF Approval? How the Attack Works The infection starts when a user downloads the disguised crypto app, believing it to be a genuine tool. Hidden within the app is an obfuscated JavaScript payload that runs silently in the background. It steals files, login credentials, and even browser wallet details before uploading them to remote servers controlled by the attackers. Besides stealing sensitive data, the malware also collects seed phrases and passwords used to access crypto wallets. This allows the hackers to drain funds from hot wallets directly connected to the victim’s computer. As a result, cryptocurrency holders have become prime targets in this sophisticated campaign. Consequences and Recommended Actions Those who suspect exposure to the malware are advised to treat their wallets as compromised. Experts recommend moving funds immediately to new wallets and revoking token approvals from old ones. Additionally, reinstalling the operating system is considered one of the most effective ways to remove any lingering malware components. Users are urged to avoid running code from unverified sources or downloading unknown npm packages. When possible, new software should be tested within isolated environments such as virtual machines or containers. These precautions can significantly reduce the risk of infection. A Growing Cyber Threat Reports suggest that North Korean hackers have already stolen approximately $2 billion worth of cryptocurrency this year alone. Data from blockchain analytics firm Elliptic shows that the total value of stolen assets linked to the regime now stands at $6 billion. This underlines the scale of the threat posed by state-backed cybercrime. Cybersecurity specialists warn that these attacks are becoming more precise and harder to detect. Consequently, both individual crypto users and blockchain companies must remain vigilant. Strengthening security measures and monitoring unusual system activity remain vital steps in defending against future breaches. Also Read: Ripple CTO Clears Misconception About XRP Ledger’s Unique Node List The post North Korean Hackers Deploy New ‘OtterCookie’ Malware Through Fake Crypto Apps and npm Packages appeared first on 36Crypto.

North Korean Hackers Deploy New ‘OtterCookie’ Malware Through Fake Crypto Apps and npm Packages

  • North Korean hackers use fake crypto app to steal seeds.
  • Malware OtterCookie and BeaverTrail harvest keystrokes, screenshots and clipboard data.
  • Victims lured with bogus job offers, assume hot wallets compromised.

Hackers linked to North Korea have launched a new wave of cyberattacks targeting cryptocurrency users and developers. According to cybersecurity firm Cisco Talos, the attackers are using a malicious JavaScript payload hidden within a fake crypto application and an npm package to steal sensitive user data. The campaign, powered by the “OtterCookie” and “BeaverTrail” malware, has been described as highly organized and financially motivated.


Victims are often lured with fake job offers or freelance gigs that appear legitimate. Once the victim downloads the infected application, the malware secretly installs itself on the system. It then begins collecting critical data such as keystrokes, screenshots, clipboard content, and wallet information from popular extensions like Metamask.


Also Read: Solana (SOL) Price Prediction 2025–2030: Will SOL Break Past $250 After ETF Approval?


How the Attack Works

The infection starts when a user downloads the disguised crypto app, believing it to be a genuine tool. Hidden within the app is an obfuscated JavaScript payload that runs silently in the background. It steals files, login credentials, and even browser wallet details before uploading them to remote servers controlled by the attackers.


Besides stealing sensitive data, the malware also collects seed phrases and passwords used to access crypto wallets. This allows the hackers to drain funds from hot wallets directly connected to the victim’s computer. As a result, cryptocurrency holders have become prime targets in this sophisticated campaign.


Those who suspect exposure to the malware are advised to treat their wallets as compromised. Experts recommend moving funds immediately to new wallets and revoking token approvals from old ones. Additionally, reinstalling the operating system is considered one of the most effective ways to remove any lingering malware components.


Users are urged to avoid running code from unverified sources or downloading unknown npm packages. When possible, new software should be tested within isolated environments such as virtual machines or containers. These precautions can significantly reduce the risk of infection.


A Growing Cyber Threat

Reports suggest that North Korean hackers have already stolen approximately $2 billion worth of cryptocurrency this year alone. Data from blockchain analytics firm Elliptic shows that the total value of stolen assets linked to the regime now stands at $6 billion. This underlines the scale of the threat posed by state-backed cybercrime.


Cybersecurity specialists warn that these attacks are becoming more precise and harder to detect. Consequently, both individual crypto users and blockchain companies must remain vigilant. Strengthening security measures and monitoring unusual system activity remain vital steps in defending against future breaches.


Also Read: Ripple CTO Clears Misconception About XRP Ledger’s Unique Node List


The post North Korean Hackers Deploy New ‘OtterCookie’ Malware Through Fake Crypto Apps and npm Packages appeared first on 36Crypto.

Market Opportunity
RWAX Logo
RWAX Price(APP)
$0.0003097
$0.0003097$0.0003097
+25.63%
USD
RWAX (APP) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Wealthfront Corporation (WLTH) Shareholders Who Lost Money – Contact Law Offices of Howard G. Smith About Securities Fraud Investigation

Wealthfront Corporation (WLTH) Shareholders Who Lost Money – Contact Law Offices of Howard G. Smith About Securities Fraud Investigation

BENSALEM, Pa.–(BUSINESS WIRE)–Law Offices of Howard G. Smith announces an investigation on behalf of Wealthfront Corporation (“Wealthfront” or the “Company”) (NASDAQ
Share
AI Journal2026/01/21 05:30
Polygon Tops RWA Rankings With $1.1B in Tokenized Assets

Polygon Tops RWA Rankings With $1.1B in Tokenized Assets

The post Polygon Tops RWA Rankings With $1.1B in Tokenized Assets appeared on BitcoinEthereumNews.com. Key Notes A new report from Dune and RWA.xyz highlights Polygon’s role in the growing RWA sector. Polygon PoS currently holds $1.13 billion in RWA Total Value Locked (TVL) across 269 assets. The network holds a 62% market share of tokenized global bonds, driven by European money market funds. The Polygon POL $0.25 24h volatility: 1.4% Market cap: $2.64 B Vol. 24h: $106.17 M network is securing a significant position in the rapidly growing tokenization space, now holding over $1.13 billion in total value locked (TVL) from Real World Assets (RWAs). This development comes as the network continues to evolve, recently deploying its major “Rio” upgrade on the Amoy testnet to enhance future scaling capabilities. This information comes from a new joint report on the state of the RWA market published on Sept. 17 by blockchain analytics firm Dune and data platform RWA.xyz. The focus on RWAs is intensifying across the industry, coinciding with events like the ongoing Real-World Asset Summit in New York. Sandeep Nailwal, CEO of the Polygon Foundation, highlighted the findings via a post on X, noting that the TVL is spread across 269 assets and 2,900 holders on the Polygon PoS chain. The Dune and https://t.co/W6WSFlHoQF report on RWA is out and it shows that RWA is happening on Polygon. Here are a few highlights: – Leading in Global Bonds: Polygon holds 62% share of tokenized global bonds (driven by Spiko’s euro MMF and Cashlink euro issues) – Spiko U.S.… — Sandeep | CEO, Polygon Foundation (※,※) (@sandeepnailwal) September 17, 2025 Key Trends From the 2025 RWA Report The joint publication, titled “RWA REPORT 2025,” offers a comprehensive look into the tokenized asset landscape, which it states has grown 224% since the start of 2024. The report identifies several key trends driving this expansion. According to…
Share
BitcoinEthereumNews2025/09/18 00:40
VIRGINIA BEACH’S LANDSTOWN COMMONS ACQUIRED FOR $102 MILLION BY AN AFFILIATE OF YALE REALTY SERVICES CORP.

VIRGINIA BEACH’S LANDSTOWN COMMONS ACQUIRED FOR $102 MILLION BY AN AFFILIATE OF YALE REALTY SERVICES CORP.

First-in-Class Retail Plaza, Located in Prime Area Appeals with Demographic Diversity, High Employment Rate, Military and Vacation Population WHITE PLAINS, N.Y.,
Share
AI Journal2026/01/21 05:28