Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
April 30, 2026
Home/Threats/WaterPlum Deploys StoatWaffle Malware in VSCode-Based Supply
Threats

WaterPlum Deploys StoatWaffle Malware in VSCode-Based Supply

North Korea-linked WaterPlum has deployed StoatWaffle, a dangerous new malware, infiltrating developer machines through compromised Visual Studio Code (VSCode) repositories disguised as legitimate...

Sarah simpson
Sarah simpson
March 19, 2026 3 Min Read
0 0

North Korea-linked WaterPlum has deployed StoatWaffle, a dangerous new malware, infiltrating developer machines through compromised Visual Studio Code (VSCode) repositories disguised as legitimate blockchain development projects.

WaterPlum has been running a campaign known as “Contagious Interview” for some time, drawing victims in through fake job interview setups and tricking them into running harmful code on their systems.

The group is divided into several teams, and Team 8 — also tracked under the names Moralis and Modilus — is responsible for this latest wave. Team 8 previously depended on a malware family called OtterCookie as its main tool.

Starting around December 2025, the team shifted gears and began deploying StoatWaffle instead, signaling a clear and deliberate upgrade in its attack toolkit.​

NTT Security analysts identified StoatWaffle while investigating Team 8’s latest activities, noting that the malware marks a meaningful shift in WaterPlum’s operational approach.

Their report, published on March 17, 2026, describes StoatWaffle as a fully modular, Node.js-based framework that operates in stages — consisting of a loader, a credential-stealing module, and a remote access trojan (RAT) component — each working together to give attackers deep access to compromised systems.​

The attack starts with a carefully crafted repository shared among developers. Team 8 builds what appears to be a genuine blockchain project and places it where developers are likely to discover it.

Hidden inside the project is a .vscode folder containing a tasks.json file configured with a runOn: folderOpen setting.

As soon as a developer opens the folder in VSCode and grants it trust, the editor automatically executes a pre-set task — requiring no further action from the victim.​

Attack flow (Source - NTT Security)
Attack flow (Source – NTT Security)

What makes this threat particularly serious is that most developers would not expect that simply opening a VSCode project folder could silently trigger a full malware infection running in the background — no scripts to run manually, no prompts to accept.​

StoatWaffle’s Infection Chain

When the malicious task executes, it reaches out to a Vercel-hosted web application and downloads a batch script called vscode-bootstrap.cmd. This script first checks whether Node.js is installed on the machine.

If it is not, the script quietly downloads and installs it from the official Node.js website — removing a key technical barrier without drawing any attention. It then fetches a JavaScript file called env.npl, which acts as the first-stage downloader in StoatWaffle’s infection chain.​

The env.npl file connects to a C2 server at 147[.]124.202.208 on port 3000 and polls the /api/errorMessage endpoint every five seconds.

When the server responds with an error status, the loader runs the JavaScript code embedded in that response, pulling down the second-stage payload.

Roughly five minutes into this polling cycle, the second downloader arrives and begins its own loop against the /api/handleErrors endpoint on the same server, silently spawning hidden child processes to stay out of sight.​

Once the second downloader is active, StoatWaffle deploys both its Stealer and RAT modules at the same time.

The Stealer targets saved browser credentials and cryptocurrency wallet extension data across Chromium-based and Firefox browsers; on macOS, it also collects the Keychain database.

The RAT module awaits commands from the C2 server and can list files, run shell commands, upload directories, and search for files matching a keyword — giving the attacker wide and persistent control over the infected host.​

Developers should avoid trusting unfamiliar or unverified VSCode repositories, particularly those related to blockchain or cryptocurrency work.

VSCode workspace trust settings should be reviewed carefully, and policies restricting runOn: folderOpen behavior should be enforced. Security teams are advised to block these indicators of compromise: 185[.]163.125.196, 147[.]124.202.208, 163[.]245.194.216, 66[.]235.168.136, and 87[.]236.177.9.

Watching for unexpected Node.js installations or hidden child processes spawned from VSCode can also serve as an early warning of compromise.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

SnappyClient Implant: Remote Access, Data Theft & E

Next Post

CISA Warns: Microsoft SharePoint Vulnerability Actively

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Jenkins Fixes High-Severity Plugin Flaws: Patches Including
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us