Gate Alpha 2nd Points Carnival Round 4 Hot Launch! Trade to Share $30,000 MORE & Alpha Points
Trade $MORE to unlock Listing Airdrops + $300K Points Prize Pool!
💰 Total Airdrop Volume: $30,000 MORE, Limited slots—first come, first served!
✅ Total Points: 2 Alpha Points per trade—accumulate points to share the $300K prize pool!
🔥Trade the Hottest On-Chain Assets First
For more information: https://www.gate.com/campaigns/1342alpha?pid=X&c=MemeBox&ch=vxDB0fQ5
North Korean Npm Malware Targets Developers In Fake Job Interviews
HomeNews* Researchers uncovered 35 new malicious npm packages tied to North Korean threat actors.
Each package contains a tool called HexEval, which is a hex-encoded loader that collects information about the host computer after installation. HexEval selectively deploys another malicious program named BeaverTail, which can download and run a Python-based backdoor called InvisibleFerret. This sequence allows the Hackers to steal sensitive data and remotely control the infected system. “This nesting-doll structure helps the campaign evade basic static scanners and manual reviews,” stated Socket researcher Kirill Boychenko.
The campaign often begins when threat actors pose as recruiters on platforms like LinkedIn. They contact software engineers and send fake job assignments via links to projects hosted on GitHub or Bitbucket where these npm packages are embedded. Victims are then convinced to download and run these projects, sometimes outside of secure environments.
The Contagious Interview operation, first detailed by Palo Alto Networks Unit 42 in late 2023, seeks unauthorized access to developer machines primarily for cryptocurrency and data theft. The campaign is also known by names like CL-STA-0240, DeceptiveDevelopment, and Gwisin Gang.
Socket reports that current attacker tactics combine malware-laced open source packages, tailored social engineering, and layered delivery mechanisms to bypass security systems. The campaign shows ongoing refinement, with the addition of cross-platform keyloggers and new malware delivery techniques.
Recent activity includes the use of a social engineering strategy called ClickFix, which delivers malware such as GolangGhost and PylangGhost. This sub-campaign, ClickFake Interview, continues to target developers with customized payloads for deeper surveillance when necessary.
Previous Articles: