Loading cryptocurrency prices...

North Korean Hackers Target npm, Spread Malware to Web3 Devs

North Korean Hackers Target Web3 Developers with Massive npm Malware Attack, Steal Crypto Wallet Keys

  • North Korean Hackers uploaded over 300 malicious code packages to the public JavaScript library npm.
  • The attack targeted developers in the Web3 and crypto sectors, aiming to steal passwords and digital wallet keys.
  • Malicious packages were downloaded about 50,000 times before most were removed.
  • Attackers posed as fake tech recruiters to entice victims, using tactics seen in prior state-backed cyber operations.
  • Security experts warn that supply-chain attacks like this are a growing threat to the software development community.

A Cybersecurity firm reported that North Korean hackers deployed more than 300 malicious code packages onto the npm registry, a tool used widely to share JavaScript software. The attack, discovered by Socket, was called the “Contagious Interview” campaign and appears to have targeted developers in the blockchain and cryptocurrency industries.

- Advertisement -

According to the cybersecurity researchers, the malicious packages installed software designed to steal login credentials, browser data, and cryptocurrency wallet keys. These packages were downloaded about 50,000 times before most were removed, though some remain available. Attackers made the code look legitimate, often using similar names to trusted software libraries.

The campaign used encrypted scripts that ran secretly in computer memory, making detection difficult. Socket linked the effort to North Korean state-sponsored hackers based on the technical patterns and tactics used, including impersonating recruiters through fake LinkedIn accounts. Security experts warn that this type of software supply-chain attack enables malicious code to be added to many apps through standard updates and shared code.

The npm platform, owned by GitHub, said it removes harmful packages when found and is improving identity checks for users. However, security researchers described the ongoing challenge as “whack-a-mole: take down one set of malicious packages, and hundreds more soon take their place.”

Previous cases from agencies like the U.S. Cybersecurity and Infrastructure Security Agency show that North Korea has stolen billions of dollars in digital assets using similar methods. Experts stress that open-source software’s accessibility, while a strength, exposes projects to these risks. Developers are advised to treat every software installation as a potential threat and to check dependencies with automated security tools. More information about npm can be found here.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Amazon to Hire 250K for Holidays Amid Layoff, $19–$23/hr Pay

Amazon plans to hire 250,000 seasonal and permanent workers across the U.S. for the...

Walmart Stock Hits ATH After OpenAI Deal, Eyes $125 Target

Walmart stock rose 5.6% over the past week, reaching a record high. The company's partnership...

GitHub Suspension Sparks Concerns Over Microsoft’s Bitcoin Power

A Bitcoin developer's account was suspended by Microsoft's GitHub, raising concerns over centralized control.The...

Gold Surges to Record $4,200 as Safe-Haven Demand Soars Globally

Gold reached a record high above $4,200 per ounce, largely driven by increased demand...

Shiba Inu Price: Can SHIB Ever Reach $1 Amid Massive Supply?

Shiba Inu remains one of the most widely followed cryptocurrencies. Current market data show the...
- Advertisement -

Must Read

This is How to Buy and Sell Bitcoin

Now more than ever, there are a variety of ways to enter and exit the crypto market. While this is good, the availability of...