North Korean XORIndex Malware Targets npm Registry in New Attack

  • North Korean threat actors posted 67 malicious npm packages, expanding ongoing software supply chain attacks.
  • The new Malware loader “XORIndex” and existing “HexEval” loader targeted developers, leading to over 17,000 combined downloads.
  • The campaign, called “Contagious Interview,” lures developers with fake coding assignments using open-source projects.
  • The loaders deploy info-stealing malware, including “BeaverTail” and “InvisibleFerret,” to steal browser and cryptocurrency data.
  • The attackers are evolving their methods, frequently changing npm accounts and updating their malware for better stealth.

North Korean cyber actors linked to the “Contagious Interview” campaign released 67 new malicious packages on the npm registry. Security firm Socket identified the activity in June and July 2025, as attackers continue to target the open-source software supply chain.

- Advertisement -

The reported malware packages have already collected more than 17,000 downloads. These packages use a new malware loader called XORIndex, as well as an older loader known as HexEval. “The Contagious Interview operation continues to follow a whack-a-mole dynamic, where defenders detect and report malicious packages, and North Korean threat actors quickly respond by uploading new variants,” said researcher Kirill Boychenko at Socket in a blog post.

The campaign, dating back to late 2023, tricks developers into downloading malicious open-source packages by pretending they are part of a coding assignment. The group, also called DeceptiveDevelopment, Famous Chollima, and UNC5342, targets existing employees at organizations of interest. Researchers believe this effort supports North Korea’s strategy of gaining access to sensitive company data.

The attack chain is direct: malicious npm packages act as delivery channels for the “BeaverTail” JavaScript loader, designed to steal information from web browsers and cryptocurrency wallets. This malware can also install a secondary backdoor, known as “InvisibleFerret.” Boychenko noted, “The two campaigns now operate in parallel. XORIndex has accumulated over 9,000 downloads in a short window (June to July 2025), while HexEval continues at a steady pace, with more than 8,000 additional downloads.”

Both XORIndex and HexEval profile infected machines using hard-coded command-and-control servers before sending information remotely and launching BeaverTail. Analyses show the malware has become more sophisticated, with newer versions adding system profiling features and improved stealth.

Researchers expect these threat actors to continue shifting their tactics, rotating npm maintainer aliases and evolving their malware families to bypass detection and reach more victims.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Hedera Leads in Trustworthy Agentic AI with Four-Layered Stack

Hedera is positioned as a leading infrastructure provider for agentic Artificial Intelligence (AI), focusing...

Bitcoin Soars to $123,000 as Trump Eyes Fed Shakeup and Rate Cuts

Bitcoin surged to a new all-time high of $123,000, rising 60% since April. Traders expect...

Dormant 2011 Bitcoin Whale Moves $4.7B to Galaxy Digital

A Bitcoin wallet dormant since 2011 moved $4.7 billion in BTC to Galaxy Digital...

AsyncRAT Evolves: New Variants Fuel Surge in Open-Source Malware

AsyncRAT is a widely used open-source remote access trojan (RAT) that has led to...

SCO 2025: China Pushes Digital Trade, Plans to Sideline US Dollar

The Shanghai Cooperation Organization (SCO) held a Global Mayor's Dialogue in Tianjin, China on...

Must Read

8 Best Crypto Debit Cards For Spending Your Digital Tokens

What are | How we chose | Best crypto debit cards | Binance Card? | FAQ | Final WordsCrypto debit cards have transformed how...