Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » North Korean hackers target developers with malicious npm packages
Global Security

North Korean hackers target developers with malicious npm packages

AdminBy AdminAugust 30, 2024No Comments4 Mins Read
Malicious npm Packages
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 30, 2024Ravi LakshmananCryptocurrency / Malware

Malicious npm packages

Threat actors linked to North Korea have been seen publishing a number of malicious packages to the npm registry, indicating a “coordinated and relentless” effort to target malware developers and steal cryptocurrency assets.

The latest wave, observed between August 12 and 27, 2024, included packages named temp-etherscan-api, ethersscan-api, telegram-con, helmet-validate, and qq-console.

“The behavior of this company leads us to believe that qq-console is related to a North Korean company known as Contagious Interview,” wrote software security firm Phylum. said.

Contagious interview refers to an campaign continues which seeks to compromise software developers with information-stealing malware as part of a supposed interview process that involves tricking them into downloading fake npm packages or fake installers for video conferencing software like MiroTalk hosted on fraudulent websites.

The ultimate goal of the attacks is to deploy a Python payload called InvisibleFerret that can extract sensitive data from cryptocurrency wallet browser extensions and configure storage on the host using legitimate remote desktop software such as AnyDesk. CrowdStrike tracks activity under the alias Famous Chollima.

Cyber ​​security

The recently spotted helmet-validate package uses a new approach that embeds a piece of JavaScript code file called config.js that directly executes JavaScript hosted on a remote domain (“ipcheck(.)cloud”) using eval() function..

“Our investigation revealed that ipcheck(.)cloud resolves to the same IP address (167(.)88(.)36(.)13) that mirotalk(.)net resolves to when online,” Philum said , emphasizing potential links between two sets of attacks.

The company said it also noticed another package called sass-notification, which was uploaded on August 27, 2024, and which bore similarities to previously open source npm libraries such as call-blockflow. These packages were attributed to another North Korean threat group called Moonstone.

“These attacks are characterized by the use of JavaScript obfuscation to write and execute batch and PowerShell scripts,” it said. “The scripts download and decrypt the deleted payload, execute it as a DLL, and then attempt to clean up all traces of malicious activity, leaving behind a seemingly benign package on the victim’s machine.”

The famous Cholima presents himself as an IT worker in US firms

The disclosure is via the CrowdStrike link The famous Chollima (formerly BadClone) to insider threat operations which entail penetration into the corporate environment under the pretext of legal employment.

“A known Chollima conducted these operations while obtaining a contract or equivalent full-time employment, using forged or stolen identification documents to bypass background checks,” the company said in a statement. said. “When applying for jobs, these malicious insiders submitted resumes that typically listed previous employment at a well-known company, as well as additional, lesser-known companies with no gaps in employment.”

Cyber ​​security

While these attacks are mostly financially motivated, some incidents are said to involve the theft of sensitive information. CrowdStrike said it identified threat actors targeting or actively working for more than 100 unique companies over the past year, most of which are located in the United States, Saudi Arabia, France, the Philippines and Ukraine.

Top target sectors include technology, fintech, financial services, professional services, retail, transportation, manufacturing, insurance, pharmaceuticals, social media and media companies.

“After gaining employee-level access to the victim’s networks, the insiders performed minimal tasks related to their job roles,” the company further stated. In some cases, insiders also attempted to steal data using Git, SharePoint, and OneDrive.”

“Additionally, insiders installed the following RMM tools: RustDesk, AnyDesk, TinyPilot, VS Code Dev Tunnels, and Google Chrome Remote Desktop. The insiders then used these RMM tools in tandem with the company’s network credentials, allowing multiple IP addresses to connect to the victim’s system.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025

Microsoft Patches 67 vulnerability, including Zero-Day Webdav, is exploited in the wild

June 11, 2025

Researchers disclose configuration risks, including five CVE, in the Salesforce Industry Cloud

June 10, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.