Loading cryptocurrency prices...

North Korean Hackers Target npm, Spread Malware to Web3 Devs

North Korean Hackers Target Web3 Developers with Massive npm Malware Attack, Steal Crypto Wallet Keys

  • North Korean Hackers uploaded over 300 malicious code packages to the public JavaScript library npm.
  • The attack targeted developers in the Web3 and crypto sectors, aiming to steal passwords and digital wallet keys.
  • Malicious packages were downloaded about 50,000 times before most were removed.
  • Attackers posed as fake tech recruiters to entice victims, using tactics seen in prior state-backed cyber operations.
  • Security experts warn that supply-chain attacks like this are a growing threat to the software development community.

A Cybersecurity firm reported that North Korean hackers deployed more than 300 malicious code packages onto the npm registry, a tool used widely to share JavaScript software. The attack, discovered by Socket, was called the “Contagious Interview” campaign and appears to have targeted developers in the blockchain and cryptocurrency industries.

- Advertisement -

According to the cybersecurity researchers, the malicious packages installed software designed to steal login credentials, browser data, and cryptocurrency wallet keys. These packages were downloaded about 50,000 times before most were removed, though some remain available. Attackers made the code look legitimate, often using similar names to trusted software libraries.

The campaign used encrypted scripts that ran secretly in computer memory, making detection difficult. Socket linked the effort to North Korean state-sponsored hackers based on the technical patterns and tactics used, including impersonating recruiters through fake LinkedIn accounts. Security experts warn that this type of software supply-chain attack enables malicious code to be added to many apps through standard updates and shared code.

The npm platform, owned by GitHub, said it removes harmful packages when found and is improving identity checks for users. However, security researchers described the ongoing challenge as “whack-a-mole: take down one set of malicious packages, and hundreds more soon take their place.”

Previous cases from agencies like the U.S. Cybersecurity and Infrastructure Security Agency show that North Korea has stolen billions of dollars in digital assets using similar methods. Experts stress that open-source software’s accessibility, while a strength, exposes projects to these risks. Developers are advised to treat every software installation as a potential threat and to check dependencies with automated security tools. More information about npm can be found here.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Russia to Float First Chinese Yuan Bonds in December 2025

Russia plans to issue its first bonds denominated in the Chinese yuan in December...

Bitcoin Dips Below $100K, JPMorgan Predicts $170K by 2026

Bitcoin's price recently dropped below $100,000, falling to around $94,000 before rebounding.JPMorgan analysts identified...

Aster Confirms Tokenomics Unchanged After CMC Data Mix-Up

Aster confirms no changes to its tokenomics after update discrepancies triggered community concern.Incorrect token...

Five Guilty in US Scheme Aiding North Korean IT Worker Fraud

Five individuals pleaded guilty to aiding North Korea in illicit revenue by enabling fraudulent...

XRP Selling Pressure Rises Amid ETF Debut and Market Shifts

Selling pressure on XRP has increased amid market volatility but recent regulatory progress may...
- Advertisement -

Must Read

Are Cryptocurrency Securities?

TL;DR - Cryptocurrencies are not typically considered securities, as they are decentralized digital assets that operate independently of any central authority or government. However,...