North Korean hackers are using malicious npm packages to target developers

security
OpenVPN-protokollet - därför är det så bra (Image credit: Shutterstock)

North Korean state-sponsored threat actors were observed pushing malicious packages into the npm registry, in an attempt to infiltrate endpoints belonging to software developers.

This time around, they were spotted by cybersecurity researchers from Phylum, who argue the end goal of the campaign is to steal people’s cryptocurrencies.

According to the researchers, the attack started on August 12 this year. Multiple malicious npm packages were uploaded, including temp-etherscan-api, and two versions of ethersscan-api. More than a week later, the crooks uploaded telegram-con, and another version of ethersscan-api, and some time later, qq-console. Chances are, there are even more packages out there.

InvisibleFerret and Lazarus

All these npm packages are just a cog in a wider wheel of a malicious campaign the researchers dubbed “Contagious Interview”. The crooks would 'impersonate' a major software development company (be it in web2 or web3), and pretend to offer a great new job opportunity to the victims. Sometimes, they would reach out via LinkedIn, and sometimes, via instant messaging platforms such as Telegram.

The victims, usually software developers already working on blockchain-based solutions, would be offered a great job with a significant salary increase, and would be invited for a series of interviews. In one of those interviews, they would either be asked to download and open a .PDF file or, in this case, an npm package.

These packages deploy a piece of Python malware called InvisibleFerret, capable of exfiltrating sensitive data from cryptocurrency wallet browser extensions.

Although the researchers never mention them by name, this is a method usually deployed by the North Korean state-sponsored group known as Lazarus.

Lazarus is one of the largest, most disruptive hacking collectives to come out of North Korea. It’s been attributed with some of the largest cryptocurrency heists in history, including the theft of more than $600 million. Allegedly, the country is using the money to fund its state apparatus, as well as its weapons program.

Via The Hacker News

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Image depicting a hand on a scanner
New Lazarus Group campaign sees North Korean hackers spreading undetectable malware through GitHub and open source packages
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
North Korean Lazarus hackers launch large-scale cyberattack by cloning open source software
North Korean flag with a hooded hacker
North Korean hackers are posing as software development recruiters to target freelancers
A digital representation of a lock
Looking for a new job? Watch out you don't fall for this new malware scam
A hand reaching out to touch a futuristic rendering of an AI processor.
North Korean fake job hackers are going the extra mile to make sure their scams seem legit
Hacker silhouette working on a laptop with North Korean flag on the background
North Korean hackers are targeting LinkedIn jobseekers with new malware - here's how to stay safe
Latest in Security
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Coinbase targeted after recent Github attacks
hacker.jpeg
Key trusted Microsoft platform exploited to enable malware, experts warn
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Latest in News
Zendesk Relate 2025
Zendesk Relate 2025 - everything you need to know as the event unfolds
Disney Plus logo with popcorn
You can finally tell Disney+ to stop bugging you about that terrible Marvel show you regret starting
Google Gemini AI
Gemini can now see your screen and judge your tabs
Girl wearing Meta Quest 3 headset interacting with a jungle playset
Latest Meta Quest 3 software beta teases a major design overhaul and VR screen sharing – and I need these updates now
Philips Hue
Philips Hue might be working on a video doorbell, and according to a new report, we just got our first look at it
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand