On December 18, 2025, cybersecurity firm Darktrace unveiled new findings regarding a perilous variant of BeaverTail malware, classified as a JavaScript-based information stealer. This malware, associated with North Korea’s infamous Lazarus Group, is part of a growing wave of cyber-attacks directed at the financial and cryptocurrency sectors.
The research, disseminated to Hackread.com, forms part of Darktrace’s recent publication titled “The State of Cybersecurity.” According to the researchers, the malware frequently infiltrates systems through deceptive job offers. Cybercriminals pose as recruiters, enticing software developers and cryptocurrency traders into “technical interviews” that require the installation of seemingly benign tools like MiroTalk or FreeConference. However, these downloads serve as a facade aimed at breaching the victim’s system.
A History of Evolution
BeaverTail is not a new entrant in the malware landscape; its activity dates back to 2022. However, it has undergone substantial evolution. In a report from October 2025, Hackread.com documented the malware’s merging with another strain known as OtterCookie.
This transformation has been progressive. Darktrace’s researchers observed that while earlier versions in 2024 primarily targeted browser profiles, by early 2025, the malware had expanded its capabilities to capture any data copied to a user’s clipboard. The latest V5 version escalates this threat, logging every keystroke and capturing a screenshot of the victim’s desktop every four seconds. The report indicated that once the malware is operational, it can extract browser credentials, credit card information, and cryptocurrency wallet keys.
Modern Tactics and Blockchain Tricks
The proliferation of this latest version poses significant challenges in detection, as hackers now conceal the malware within VS Code extensions and npm packages—key components in application development. This has transformed BeaverTail into a “modular, cross-platform” threat, seamlessly operating across Windows, Mac, and Linux environments.
Further analysis has revealed that this iteration employs sophisticated techniques with “over 128 layers” of obfuscation to conceal its code, representing a significant leap in evasion tactics compared to previous versions. The current campaigns, which compromise a diverse array of targets from marketing professionals to retail workers, have been traced back to North Korean hacker clusters such as Famous Chollima, Gwisin Gang, and Tenacious Pungsan, all related to the larger Lazarus Group framework.
Notably, these attacker groups now utilize a method known as EtherHiding, which stores malicious commands within blockchain smart contracts, complicating efforts to neutralize these threats. Cybersecurity experts recommend rigorously verifying any job offer through official channels before engaging in any technical assessments to mitigate these risks.
Expert Comment
Jason Soroko, Senior Fellow at Sectigo, highlighted the significance of Darktrace’s discovery, commenting that the identification of a highly obfuscated BeaverTail variant indicates a notable escalation in the sophistication of malware tactics. According to Soroko, by weaponizing the software supply chain through compromised npm packages and VS Code extensions, the Lazarus Group is leveraging developer confidence while enhancing the resilience of their operations through EtherHiding, ensuring that their command-and-control infrastructure remains robust against takedowns.
The convergence of BeaverTail with the OtterCookie strain culminates in a versatile platform tailored for persistent financial theft and surveillance across various operating systems, underscoring the dire need for businesses to bolster their cybersecurity frameworks in light of these evolving threats. The MITRE ATT&CK framework indicates that the potential tactics employed in these attacks may include initial access, persistence, and privilege escalation, emphasizing the multifaceted nature of modern cyber warfare.