#OtterCandy
(3/3)
The August 2025 update added victim profiling, letting attackers filter and sell stolen data by value.
Experts call OtterCandy a glimpse of the future — decentralized, intelligent malware built on trusted web frameworks.
#InfoSec #CyberThreats #Malware #WaterPlumClusterB
October 20, 2025 at 8:50 AM
(2/3)
Unlike typical malware, OtterCandy uses Socket.IO servers to maintain encrypted, real-time C2 connections — hiding in normal web traffic.
Its modular design and cross-OS compatibility mark it as a new generation of stealthy, adaptable cyberweapons.
October 20, 2025 at 8:50 AM
🚨 OtterCandy— a new cross-platform malware from the WaterPlum Cluster B threat group is turning heads across the cybersecurity world.
It infiltrates Windows, macOS, and Linux, stealing browser data, crypto wallets, and sensitive files with surgical precision.
#CyberSecurity #ThreatIntel #OtterCandy
October 20, 2025 at 8:50 AM
The Silent Thief Across All Systems: OtterCandy Malware’s Cross-Platform Cyber Heist

Introduction: In the vast and ever-evolving world of cyber warfare, one name has recently surfaced with alarming potential — OtterCandy. Developed by the elusive WaterPlum Cluster B, this sophisticated malware has…
The Silent Thief Across All Systems: OtterCandy Malware’s Cross-Platform Cyber Heist
Introduction: In the vast and ever-evolving world of cyber warfare, one name has recently surfaced with alarming potential — OtterCandy. Developed by the elusive WaterPlum Cluster B, this sophisticated malware has turned heads across cybersecurity circles for its seamless infiltration of Windows, macOS, and Linux environments. Unlike traditional, system-specific threats, OtterCandy stands out for its universal targeting and cunning use of modern web technologies.
undercodenews.com
October 20, 2025 at 6:11 AM
WaterPlumが使用するマルウェアOtterCandyについて

WaterPlum(あるいはFamous ChollimaやPurpleBravoとも呼ばれている)は北朝鮮に関連する攻撃グループであると言われており、特にContagious Interview[1]とClickFake Interview[2]の2つの攻撃キャンペーンを行っています。WaterPlumは複数のクラスタに分類することができますが、その中でもクラスタB(一般にBlockNovasと呼ばれているクラスタ)による活動が観測されています。

クラスタBについては過去にSilent Push社やTrend Mi...
WaterPlumが使用するマルウェアOtterCandyについて | セキュリティナレッジ | NTTセキュリティ・ジャパン株式会社
テクニカルブログ WaterPlumが使用するマルウェアOtterCandyについて
jp.security.ntt
October 18, 2025 at 10:21 PM
North Korean hackers deploy OtterCandy malware via fake job interviews, targeting blockchain and crypto sectors. Stay vigilant! #CyberSecurity #Malware #OtterCandy #ClickFakeInterview Link: thedailytechfeed.com/north-korean...
October 18, 2025 at 8:39 AM
脅威アクターがOtterCandyマルウェアを拡散するために使用するClickFakeインタビューキャンペーン

北朝鮮とつながりのあるグループであるWaterPlumのCluster Bは、ClickFake Interviewキャンペーンを通じて、Node.jsベースのRATおよび情報窃盗ツールであるOtterCandyを導入することで戦術を進化させており、2025年8月には大幅な強化が確認されました。

北朝鮮に起因するこの脅威アクターは、「Contagious Interview」と「ClickFake Interview」という 2 つの主要なキャンペーンを組織しました。
ClickFake Interview Campaign Used by Threat Actors to Deliver OtterCandy Malware
A North Korean-linked group, WaterPlum’s Cluster B, has evolved its tactics by introducing OtterCandy—a Node.js–based RAT and information stealer.
gbhackers.com
October 18, 2025 at 7:39 AM
OtterCandy, malware used by WaterPlum
OtterCandy, malware used by WaterPlum
jp.security.ntt
October 17, 2025 at 4:39 PM
Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
cybersecuritynews.com
October 17, 2025 at 3:33 PM
"WaterPlumが使用するマルウェアOtterCandyについて" published by NTTSecurity. #ContagiousInterview, #OtterCandy, #WaterPlum, #DPRK, #CTI https://jp.security.ntt/insights_resources/tech_blog/ottercandy_malware_j/
October 17, 2025 at 1:30 PM
October 17, 2025 at 1:30 PM
Researchers at NTT present an analysis of OtterCandy and detail the update observed in August 2025. This malware was used by WaterPlum (also known as Famous Chollima or PurpleBravo). jp.security.ntt/insights_res...
October 17, 2025 at 8:43 AM