• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
bogus npm packages used to trick software developers into installing

Bogus npm Packages Used to Trick Software Developers into Installing Malware

You are here: Home / General Cyber Security News / Bogus npm Packages Used to Trick Software Developers into Installing Malware
April 27, 2024

An ongoing social engineering marketing campaign is concentrating on software builders with bogus npm packages underneath the guise of a job job interview to trick them into downloading a Python backdoor.

Cybersecurity business Securonix is monitoring the action below the name DEV#POPPER, linking it to North Korean threat actors.

“Through these fraudulent interviews, the builders are often questioned to perform jobs that include downloading and working program from resources that look reputable, this kind of as GitHub,” security scientists Den Iuzvyk, Tim Peck, and Oleg Kolesnikov stated. “The software contained a malicious Node JS payload that, when executed, compromised the developer’s method.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Specifics of the campaign first emerged in late November 2023, when Palo Alto Networks Device 42 thorough an action cluster dubbed Contagious Interview in which the risk actors pose as companies to lure application developers into installing malware these as BeaverTail and InvisibleFerret as a result of the interview method.

Then earlier this February, software program source chain security organization Phylum uncovered a established of malicious packages on the npm registry that delivered the very same malware family members to siphon sensitive data from compromised developer devices.

It can be well worth noting that Contagious Interview is claimed to be disparate from Procedure Aspiration Job (aka DeathNote or NukeSped), with Device 42 telling The Hacker News that the former is “targeted on concentrating on developers, primarily as a result of bogus identities in freelance task portals, and the following levels include the use of developer resources and npm packages primary to […] BeaverTail and InvisibleFerret.”

Procedure Dream Work, connected to the prolific Lazarus Team from North Korea, is a prolonged-operating offensive marketing campaign that sends unsuspecting professionals utilized in various sectors like aerospace, cryptocurrency, protection, and other sectors malicious data files dressed as task gives to distribute malware.

Very first uncovered by Israeli cybersecurity company ClearSky at the start out of 2020, it also displays overlaps with two other Lazarus clusters regarded as Operation In(ter)ception and Operation North Star.

The attack chain specific by Securonix commences with a ZIP archive hosted on GitHub that is probably sent to the concentrate on as section of the job interview. Existing inside the file is a seemingly innocuous npm module that harbors a destructive JavaScript file codenamed BeaverTail that functions as an info stealer and a loader for a Python backdoor identified as InvisibleFerret that is retrieved from a remote server.

Cybersecurity

The implant, other than collecting process information and facts, is able of command execution, file enumeration and exfiltration, and clipboard and keystroke logging.

The advancement is a sign that North Korean menace actors keep on to hone a raft of weapons for their cyber attack arsenal, constantly updating their tradecraft with improved talents to cover their steps and mix in on host methods and networks, not to point out siphon off information and turn compromises into monetary obtain.

“When it comes to attacks which originate through social engineering, it is really critical to preserve a security-targeted state of mind, specially throughout intense and demanding situations like position interviews,” Securonix scientists mentioned.

“The attackers behind the DEV#POPPER campaigns abuse this, recognizing that the human being on the other finish is in a hugely distracted and in a substantially extra vulnerable condition.”

Identified this report exciting? Comply with us on Twitter  and LinkedIn to go through a lot more distinctive material we submit.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «severe flaws disclosed in brocade sannav san management software Severe Flaws Disclosed in Brocade SANnav SAN Management Software
Next Post: Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw ukraine targeted in cyberattack exploiting 7 year old microsoft office flaw»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.