North Korean Hackers Target npm, Spread Malware to Web3 Devs

North Korean Hackers Target Web3 Developers with Massive npm Malware Attack, Steal Crypto Wallet Keys

  • North Korean Hackers uploaded over 300 malicious code packages to the public JavaScript library npm.
  • The attack targeted developers in the Web3 and crypto sectors, aiming to steal passwords and digital wallet keys.
  • Malicious packages were downloaded about 50,000 times before most were removed.
  • Attackers posed as fake tech recruiters to entice victims, using tactics seen in prior state-backed cyber operations.
  • Security experts warn that supply-chain attacks like this are a growing threat to the software development community.

A Cybersecurity firm reported that North Korean hackers deployed more than 300 malicious code packages onto the npm registry, a tool used widely to share JavaScript software. The attack, discovered by Socket, was called the “Contagious Interview” campaign and appears to have targeted developers in the blockchain and cryptocurrency industries.

- Advertisement -

According to the cybersecurity researchers, the malicious packages installed software designed to steal login credentials, browser data, and cryptocurrency wallet keys. These packages were downloaded about 50,000 times before most were removed, though some remain available. Attackers made the code look legitimate, often using similar names to trusted software libraries.

The campaign used encrypted scripts that ran secretly in computer memory, making detection difficult. Socket linked the effort to North Korean state-sponsored hackers based on the technical patterns and tactics used, including impersonating recruiters through fake LinkedIn accounts. Security experts warn that this type of software supply-chain attack enables malicious code to be added to many apps through standard updates and shared code.

The npm platform, owned by GitHub, said it removes harmful packages when found and is improving identity checks for users. However, security researchers described the ongoing challenge as “whack-a-mole: take down one set of malicious packages, and hundreds more soon take their place.”

Previous cases from agencies like the U.S. Cybersecurity and Infrastructure Security Agency show that North Korea has stolen billions of dollars in digital assets using similar methods. Experts stress that open-source software’s accessibility, while a strength, exposes projects to these risks. Developers are advised to treat every software installation as a potential threat and to check dependencies with automated security tools. More information about npm can be found here.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Trump-Backed Firm Aims to Rival Ripple in Forex Market

World Liberty Financial, backed by the Trump family, announces its entry into the foreign...

ETHZilla Launches Tokenized Jet Engine Equity Offering

Crypto firm ETHZilla has launched the Eurus Aero Token I, a token offering backed...

Robinhood Plunges on Weak Crypto Revenue, Analyst Targets Slashed

Robinhood stock plunged nearly 9% after a Q4 2026 earnings report revealed a steep...

CFTC Taps Crypto CEOs for Advisory Panel as Congress Debates

The CFTC has added senior crypto executives to its Innovation Advisory Committee, including Coinbase...

Waymo Targets 1M Weekly Paid Rides by 2026

Waymo, owned by Alphabet, aims to surpass one million paid rides per week by...

Must Read

10 BEST Companies to Buy Hosting With Bitcoin And Crypto

If you are looking to buy hosting with bitcoin or cryptocurrency then you've come to the right place.I've done the research for you...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!