North Korean Hackers Target npm, Spread Malware to Web3 Devs

North Korean Hackers Target Web3 Developers with Massive npm Malware Attack, Steal Crypto Wallet Keys

  • North Korean Hackers uploaded over 300 malicious code packages to the public JavaScript library npm.
  • The attack targeted developers in the Web3 and crypto sectors, aiming to steal passwords and digital wallet keys.
  • Malicious packages were downloaded about 50,000 times before most were removed.
  • Attackers posed as fake tech recruiters to entice victims, using tactics seen in prior state-backed cyber operations.
  • Security experts warn that supply-chain attacks like this are a growing threat to the software development community.

A Cybersecurity firm reported that North Korean hackers deployed more than 300 malicious code packages onto the npm registry, a tool used widely to share JavaScript software. The attack, discovered by Socket, was called the “Contagious Interview” campaign and appears to have targeted developers in the blockchain and cryptocurrency industries.

- Advertisement -

According to the cybersecurity researchers, the malicious packages installed software designed to steal login credentials, browser data, and cryptocurrency wallet keys. These packages were downloaded about 50,000 times before most were removed, though some remain available. Attackers made the code look legitimate, often using similar names to trusted software libraries.

The campaign used encrypted scripts that ran secretly in computer memory, making detection difficult. Socket linked the effort to North Korean state-sponsored hackers based on the technical patterns and tactics used, including impersonating recruiters through fake LinkedIn accounts. Security experts warn that this type of software supply-chain attack enables malicious code to be added to many apps through standard updates and shared code.

The npm platform, owned by GitHub, said it removes harmful packages when found and is improving identity checks for users. However, security researchers described the ongoing challenge as “whack-a-mole: take down one set of malicious packages, and hundreds more soon take their place.”

Previous cases from agencies like the U.S. Cybersecurity and Infrastructure Security Agency show that North Korea has stolen billions of dollars in digital assets using similar methods. Experts stress that open-source software’s accessibility, while a strength, exposes projects to these risks. Developers are advised to treat every software installation as a potential threat and to check dependencies with automated security tools. More information about npm can be found here.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Meta Eyes Texas Data Center Site After OpenAI, Oracle Split

The collapse of a major AI data center expansion deal between Oracle and OpenAI...

Former CFO Gets Two Years for $35M Crypto Theft

A Seattle judge sentenced former CFO Nevin Shetty to two years in prison for...

Microsoft Stock Rises on OpenAI Partnership News

Microsoft's partnership with OpenAI has evolved from a 2019 research effort to a major...

Binance Denies $1.7 Billion Iran Sanctions Violations

Binance has firmly denied a U.S. Senator's allegations that it facilitated over $1.7 billion...

Aave Vote Sparks Service Provider Exodus

A contentious vote to fund Aave Labs passed narrowly, causing major service provider ACI...

Must Read

Buy Domain With Bitcoin: Top 8 Domain Registrars That Accept Bitcoin And Crypto

You are here because you want to buy a domain with bitcoin, right? If you are looking for domain registrars that accept bitcoin or...