- This topic has 0 replies, 1 voice, and was last updated 3 weeks, 4 days ago by
Rameses Quiambao.
- AuthorPosts
- April 8, 2026 at 10:36 am #1862
Rameses Quiambao
ParticipantSummary
On April 7, 2026, a supply chain attack has been identified involving a malicious npm package named gemini-ai-checker, designed to steal credentials and sensitive data from AI development environments.
The package masqueraded as a utility for validating Google Gemini API tokens but instead deployed malware capable of credential theft, file exfiltration, and persistent access.
The activity has been linked to OtterCookie malware, associated with the Contagious Interview campaign, attributed to North Korean (DPRK) threat actors.
Research Source
According to Cyber and Ramen analysts, the malicious payload was traced to infrastructure and techniques consistent with previously documented DPRK-linked campaigns.
The malware variant closely matches activity reported by Microsoft in March 2026, indicating the campaign has been active since at least October 2025.
Technical Details
The attack leveraged a malicious npm package disguised as a legitimate developer tool.
Key characteristics:
• Package name: gemini-ai-checker
• Hosted under attacker-controlled account (gemini-check)
• Delivered payload via Vercel staging server
• Fileless execution using Function.constructor
• Obfuscated C2 configuration split across variablesAttack flow:
Developer installs malicious npm package
Package contacts Vercel-hosted server
Retrieves malicious payload
Executes payload in memory (no disk write)
Establishes connection to attacker C2 infrastructure
Observed Attack ActivityThreat Actor
• DPRK-linked operators (Contagious Interview campaign)
• Malware: OtterCookieInfrastructure
• Vercel staging domain for payload delivery
• C2 server: 216.126.237.71
• Communication via multiple dedicated portsMalware Capabilities
Remote Access
• Establishes persistent backdoor via Socket.IOCredential Theft
• Browser credentials
• API tokens and session data
• Cryptocurrency wallets (25+ including MetaMask, Exodus)AI Tool Targeting
• Cursor
• Claude
• Windsurf
• Gemini CLI
• PearAI
• EigentData Exfiltration
• Source code
• API keys
• Developer files
• Chat logs and AI interaction dataPersistence & Evasion
• Fileless payload execution
• Obfuscated configuration
• Clipboard monitoring every 500ms
• Multi-process modular architectureImpact
Successful compromise may allow attackers to:
• Steal AI API tokens and credentials
• Access sensitive source code and development data
• Compromise developer environments
• Monitor user activity via clipboard tracking
• Gain persistent remote access
• Enable further supply chain attacks using stolen tokensBecause AI tools often store sensitive project data and credentials, this attack poses a high risk to both individual developers and organizations.
Mitigation
Recommended response actions:
Remove malicious npm packages immediately
Audit all dependencies for suspicious packages
Rotate all exposed credentials:
• API keys
• Tokens
• Wallet credentials
Monitor outbound connections (especially to Vercel domains)
Inspect Node.js processes for unusual behavior
Validate package authenticity before installation
Avoid installing unverified or newly published packages
Secure sensitive directories (.cursor, .claude, .aws, .ssh)Organizations should assume compromise if the package was installed.
References
• Cyber and Ramen Analysis – Malicious Gemini npm Package
• Cyber Security News – Fake Gemini npm Package Steals Tokens (April 7, 2026)
• Microsoft Threat Intelligence – OtterCookie Malware (March 2026)
• https://cybersecuritynews.com/hackers-use-fake-gemini-npm-package/ - AuthorPosts
- You must be logged in to reply to this topic.
