North Korean XORIndex Malware Targets npm Registry in New Attack

  • North Korean threat actors posted 67 malicious npm packages, expanding ongoing software supply chain attacks.
  • The new Malware loader “XORIndex” and existing “HexEval” loader targeted developers, leading to over 17,000 combined downloads.
  • The campaign, called “Contagious Interview,” lures developers with fake coding assignments using open-source projects.
  • The loaders deploy info-stealing malware, including “BeaverTail” and “InvisibleFerret,” to steal browser and cryptocurrency data.
  • The attackers are evolving their methods, frequently changing npm accounts and updating their malware for better stealth.

North Korean cyber actors linked to the “Contagious Interview” campaign released 67 new malicious packages on the npm registry. Security firm Socket identified the activity in June and July 2025, as attackers continue to target the open-source software supply chain.

- Advertisement -

The reported malware packages have already collected more than 17,000 downloads. These packages use a new malware loader called XORIndex, as well as an older loader known as HexEval. “The Contagious Interview operation continues to follow a whack-a-mole dynamic, where defenders detect and report malicious packages, and North Korean threat actors quickly respond by uploading new variants,” said researcher Kirill Boychenko at Socket in a blog post.

The campaign, dating back to late 2023, tricks developers into downloading malicious open-source packages by pretending they are part of a coding assignment. The group, also called DeceptiveDevelopment, Famous Chollima, and UNC5342, targets existing employees at organizations of interest. Researchers believe this effort supports North Korea’s strategy of gaining access to sensitive company data.

The attack chain is direct: malicious npm packages act as delivery channels for the “BeaverTail” JavaScript loader, designed to steal information from web browsers and cryptocurrency wallets. This malware can also install a secondary backdoor, known as “InvisibleFerret.” Boychenko noted, “The two campaigns now operate in parallel. XORIndex has accumulated over 9,000 downloads in a short window (June to July 2025), while HexEval continues at a steady pace, with more than 8,000 additional downloads.”

Both XORIndex and HexEval profile infected machines using hard-coded command-and-control servers before sending information remotely and launching BeaverTail. Analyses show the malware has become more sophisticated, with newer versions adding system profiling features and improved stealth.

- Advertisement -

Researchers expect these threat actors to continue shifting their tactics, rotating npm maintainer aliases and evolving their malware families to bypass detection and reach more victims.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bitcoin Surges as Fed Shift Sparks Market Panic and Gold Rally

Bitcoin prices rebounded after a recent downturn, amid growing speculation about Federal Reserve and...

UGM Pilots Blockchain Credentials, Digital Wallets for 60,000 Students

Universitas Gadjah Mada in Indonesia will launch digital, verifiable credentials for students, starting with...

UK Seizes £5.5B Bitcoin in Largest Crypto Fraud Bust

A Chinese woman pleaded guilty to involvement in a cryptocurrency fraud after £5.5 billion...

Trader Turns $215 Into $1.06M With Pepe (PEPE) Memecoin Surge

PEPE reached an all-time high of $0.00002803 in December 2024.An investor turned a $215...

OpenAI’s ChatGPT Drives $4.3B H1 Revenue Amid Rapid AI Growth

OpenAI reported $4.3 billion in revenue for the first half of 2025, outpacing its...
- Advertisement -

Must Read

6 Best VPN Providers That Accept Monero

Privacy and anonymity are probably the most important things that we should all consider in today's internet era. Although there are a lot of...