OtterCookie: the JavaScript RAT that turned developer compromise into live surveillance
OtterCookie is not “BeaverTail but again.”
That is the part I think matters.
BeaverTail mostly grabbed saved stuff from a developer machine.
OtterCookie keeps watching the machine after that: Socket.IO / Engine.IO, live victim rosters, clipboard, keystrokes, screenshots, browser data, wallet artifacts, dev secrets.
Less “dump the box once.” More “sit on the box while the dev keeps working.”
The annoying detection problem:
developer workstations are already garbage fires.
Node tooling, random high ports, local services, package installs, Vercel/npm traffic, Socket.IO noise. A lot of this looks dumb but normal.
So where is the line?
What would make you look at outbound Socket.IO / Engine.IO from a dev workstation and say: yeah, this is not normal Node nonsense anymore?
No creds / victim names / live paths / exploit steps in the write-up.