cybersecurity researchers have identified a new phase of a persistent cyber espionage campaign, attributed to North Korean state-sponsored actors, involving the publication of 26 malicious packages to the widely used npm software registry. The packages, which impersonate legitimate developer tools, were designed to deploy a cross-platform remote access trojan (RAT) by using Pastebin as a covert command-and-control channel. This activity represents a significant threat to the global software supply chain, targeting developers across multiple operating systems.
Campaign Details and Malicious Payload
The malicious software packages were uploaded to the npm registry, a central repository for JavaScript code used by millions of developers. According to the research findings, these packages contained obfuscated code that, once installed, would retrieve a secondary payload. This payload was disguised within seemingly innocuous content hosted on Pastebin, a popular online text-sharing service. The Pastebin content acted as a “dead drop resolver,” a technique to hide the actual internet address of the attackers’ command server.
By extracting the real command-and-control (C2) address from the Pastebin text, the malware could then download and execute a fully functional remote access trojan. This RAT is capable of operating on Windows, Linux, and macOS systems, giving the threat actors broad access to infected machines for data theft, surveillance, and further network penetration.
Attribution and Ongoing Threat
The campaign has been linked by analysts to the North Korean hacking group known as Lazarus or its subgroups, which are believed to operate under the direction of the Pyongyang government. This group is notorious for financially motivated cyberattacks and espionage operations targeting cryptocurrency firms, financial institutions, and critical infrastructure worldwide. The use of open-source software repositories like npm is a noted tactic, as it exploits the trust inherent in developer ecosystems.
This latest incident is part of an ongoing operation security researchers have dubbed “Contagious Interview.” The campaign’s evolution shows a continued refinement of tactics, specifically in hiding malicious infrastructure behind legitimate web services to avoid detection by network security tools.
Impact and Mitigation
The immediate risk is primarily to software developers who might inadvertently download and use one of the counterfeit packages in their projects. Such an action could compromise not only the developer’s own system but also any application or service built using the tainted code, leading to potential downstream infections for end-users. The npm registry maintainers have removed the identified malicious packages following the disclosure.
Security experts recommend that developers and organizations implement strict software supply chain security practices. These include verifying package sources, auditing dependencies for known vulnerabilities or malicious code, and using automated tools to scan for suspicious network activity originating from development environments.
Looking Ahead
Researchers and registry maintainers are continuing to scan for related packages and indicators of compromise. It is expected that the threat actors behind this campaign will continue to adapt their methods, potentially shifting to other code repositories or using different services for their dead drop operations. The broader cybersecurity community is likely to release further technical indicators and detection rules in the coming days to help organizations defend against this specific threat and its future variants.
Source: Various cybersecurity research reports