Skip to main content

Additional Features of OtterCookie Malware Used by WaterPlum

Medium
Published: Sun May 11 2025 (05/11/2025, 05:05:31 UTC)
Source: AlienVault OTX General

Description

The article discusses updates to the OtterCookie malware utilized by the North Korea-linked attack group WaterPlum. The malware has evolved through four versions, with v3 and v4 being the focus. OtterCookie v3 introduced Windows support and enhanced file collection capabilities. Version 4 added new Stealer modules for credential theft, improved virtual environment detection, and modified clipboard stealing methods. The malware now targets various file types, including those related to cryptocurrencies, and has sophisticated methods for stealing browser credentials. The continuous updates to OtterCookie demonstrate WaterPlum's active development efforts, posing an ongoing threat to financial institutions and cryptocurrency operators worldwide.

AI-Powered Analysis

AILast updated: 07/10/2025, 05:31:15 UTC

Technical Analysis

OtterCookie is a sophisticated malware family actively developed and deployed by the North Korea-linked threat actor group WaterPlum. The malware has undergone multiple iterations, with versions 3 and 4 introducing significant enhancements. OtterCookie v3 expanded its platform compatibility to include Windows systems and improved its file collection capabilities, enabling it to harvest a wider range of sensitive data. Version 4 further advanced the malware by integrating new Stealer modules specifically designed for credential theft, including sophisticated techniques for stealing browser credentials and clipboard data. The clipboard stealing functionality was modified to evade detection and specifically target cryptocurrency-related information, reflecting a strategic focus on financial gain through theft of digital assets. Additionally, OtterCookie v4 enhanced its ability to detect virtualized environments, a common method used by security analysts to study malware, thereby increasing its chances of evading sandbox analysis and persisting undetected in victim environments. The malware targets various file types, particularly those related to cryptocurrencies, and communicates with command and control (C2) infrastructure via domains such as alchemy-api-v3.cloud, chainlink-api-v3.cloud, modilus.io, and moralis-api-v3.cloud, which may masquerade as legitimate services to avoid detection. Despite no known public exploits in the wild, the continuous updates and active development of OtterCookie demonstrate WaterPlum's commitment to maintaining and enhancing this threat, posing an ongoing risk to financial institutions and cryptocurrency operators worldwide.

Potential Impact

For European organizations, especially financial institutions and cryptocurrency operators, OtterCookie represents a significant threat to confidentiality and integrity. The malware's advanced credential theft capabilities can lead to unauthorized access to sensitive accounts, resulting in financial theft, fraud, and disruption of critical services. The targeted theft of cryptocurrency-related files and clipboard data increases the risk of direct financial losses through the theft of digital assets. The malware's enhanced virtual environment detection complicates incident response and forensic analysis, potentially prolonging undetected compromise and increasing the overall damage. Stolen credentials and data could also facilitate lateral movement within networks, escalating the impact and enabling further exploitation. Given Europe's expanding cryptocurrency market and the critical role of financial institutions in the economy, successful attacks could undermine trust in financial systems, trigger regulatory penalties, and cause significant financial and reputational harm.

Mitigation Recommendations

European organizations should adopt targeted and proactive defenses against OtterCookie, including: 1) Enhancing endpoint detection and response (EDR) capabilities to identify and block known OtterCookie indicators, particularly monitoring for suspicious domain communications with identified C2 domains (alchemy-api-v3.cloud, chainlink-api-v3.cloud, modilus.io, moralis-api-v3.cloud). 2) Deploying behavioral analytics focused on detecting unusual clipboard access and credential theft activities, especially those involving browser credential stores and cryptocurrency wallet files. 3) Hardening systems by restricting execution of unauthorized scripts and binaries, and implementing application whitelisting where feasible to prevent malware persistence. 4) Implementing strict network segmentation to limit lateral movement in case credentials are compromised. 5) Conducting regular threat hunting exercises focused on detecting signs of virtual environment evasion and stealthy data exfiltration. 6) Educating users on the risks of clipboard data exposure and enforcing strict controls on the use of cryptocurrency wallets and related software. 7) Maintaining up-to-date threat intelligence feeds to quickly identify and respond to emerging WaterPlum tactics and indicators. 8) Enforcing multi-factor authentication (MFA) across critical systems to reduce the impact of stolen credentials. 9) Monitoring for anomalous outbound traffic patterns indicative of C2 communication. Combined with robust incident response planning and continuous monitoring, these measures will significantly reduce the risk posed by OtterCookie.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://jp.security.ntt/tech_blog/en-waterplum-ottercookie"]
Adversary
WaterPlum
Pulse Id
6820301bf40ecf6cb4a38f38
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainalchemy-api-v3.cloud
domainchainlink-api-v3.cloud
domainmodilus.io
domainmoralis-api-v3.cloud

Threat ID: 6847be78bab8eb36fc32ecf5

Added to database: 6/10/2025, 5:11:20 AM

Last enriched: 7/10/2025, 5:31:15 AM

Last updated: 8/18/2025, 11:30:13 PM

Views: 27

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats