Cyware Daily Threat Intelligence, May 12, 2025

Daily Threat Briefing • May 12, 2025
Daily Threat Briefing • May 12, 2025
Not every AI tool on Facebook is what it claims to be. Threat actors are luring users with fake content-generation apps, pushing Noodlophile malware to tens of thousands of victims. Disguised as AI-powered services, these tools trick users into executing malicious files that steal browser credentials, crypto wallet data, and other sensitive information through a layered infection chain.
OtterCookie is getting smarter with every version. The North Korea-linked group WaterPlum is actively using the malware to breach financial institutions and crypto platforms worldwide. Since late 2024, new iterations have added capabilities like credential theft from browsers and file uploads - each version revealing signs of modular development and distinct authorship.
A flaw in Linux’s nftables is turning dirty sets into dangerous ones. A critical double-free vulnerability allows local attackers to escalate privileges by exploiting memory corruption. Kernel-level fixes are already rolling out to improve cleanup routines and patch the vulnerable destroy path.
Fake AI tools deploy Noodlophile malware
Threat actors are leveraging fake AI tools on Facebook to distribute the Noodlophile malware, targeting over 62,000 users. These tools masquerade as legitimate AI-powered content creation services, tricking users into downloading malicious files. The malware harvests sensitive data, including browser credentials and cryptocurrency information, through a complex infection chain initiated by a deceptive executable.
Contagious Interview drops OtterCookie
WaterPlum, a North Korea-linked attack group, has been using the OtterCookie malware to target financial institutions and cryptocurrency operators globally. Since its introduction in September 2024, OtterCookie has evolved through multiple versions, with v3 featuring file upload capabilities and Windows support, while v4 adds stealer modules for credentials from Google Chrome, MetaMask, and Brave browser. Differences in coding suggest varying developers for these modules. The group’s activities have been notably observed in Japan, with ongoing updates to the malware.
Malicious npm packages abuse Telegram
Socket has uncovered two malicious npm packages, ‘pumptoolforvolumeandcomment’ and ‘debugdogs’, designed to steal cryptocurrency wallet keys and sensitive data from users of the BullX trading platform. The malware targets Linux and macOS systems, searching for Base58-encoded keys and files related to BullX. It employs obfuscated payloads and uses a Telegram bot for real-time exfiltration of stolen data. The secondary package, debugdogs, acts as a wrapper to facilitate the spread of the primary malware.
Critical bug in Linux nftables
A critical double-free vulnerability (CVE-2024-26809) has been identified in the Linux kernel's nftables subsystem, allowing local attackers to escalate privileges and execute arbitrary code. This flaw occurs in the `nft_pipapo_destroy()` function when a "dirty" set leads to improper handling of elements, causing memory corruption. Exploitation involves creating a pipapo set, marking it as dirty, and deleting it, which triggers the vulnerability. Fixes include updates to the Linux kernel, such as improving the cloning process, integrating nft_set_pipapo into the commit protocol, and ensuring proper element release from the destroy path.
Microsoft patches critical vulnerabilities
Microsoft has identified four critical vulnerabilities in Azure and Power Apps. CVE-2025-29813 is a severe Azure DevOps flaw with a CVSS score of 10.0, allowing attackers to manipulate pipeline job tokens. CVE-2025-29827, affecting Azure Automation, scores 9.9 and enables privilege escalation for authenticated users. CVE-2025-29972 is a server-side request forgery (SSRF) vulnerability in Azure Storage, also scoring 9.9, permitting spoofing attacks. Lastly, CVE-2025-47733, an SSRF vulnerability in Power Apps, scores 9.1 and could allow unauthorized information disclosure.