Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

Posted on November 14, 2025November 14, 2025 By CWS

Nov 14, 2025Ravie LakshmananMalware / Menace Intelligence
The North Korean menace actors behind the Contagious Interview marketing campaign have as soon as once more tweaked their techniques through the use of JSON storage providers to stage malicious payloads.
“The menace actors have lately resorted to using JSON storage providers like JSON Keeper, JSONsilo, and npoint.io to host and ship malware from trojanized code tasks, with the lure,” NVISO researchers Bart Parys, Stef Collart, and Efstratios Lontzetidis mentioned in a Thursday report.
The marketing campaign basically entails approaching potential targets on skilled networking websites like LinkedIn, both below the pretext of conducting a job evaluation or collaborating on a challenge, as a part of which they’re instructed to obtain a demo challenge hosted on platforms like GitHub, GitLab, or Bitbucket.
In a single such challenge noticed by NVISO, it has been discovered {that a} file named “server/config/.config.env” comprises a Base64-encoded worth that masquerades as an API key, however, in actuality, is a URL to a JSON storage service like JSON Keeper the place the next-stage payload is saved in obfuscated format.

The payload is a JavaScript malware often known as BeaverTail, which is able to harvesting delicate knowledge and dropping a Python backdoor known as InvisibleFerret. Whereas the performance of the backdoor has remained largely unchanged from when it was first documented by Palo Alto Networks in late 2023, one notable change entails fetching a further payload dubbed TsunamiKit from Pastebin.

It is value noting that use of TsunamiKit as a part of the Contagious Interview marketing campaign was highlighted by ESET again in September 2025, with the assaults additionally dropping Tropidoor and AkdoorTea. The toolkit is able to system fingerprinting, knowledge assortment, and fetching extra payloads from a hard-coded .onion deal with that is at the moment offline.
“It is clear that the actors behind Contagious Interview aren’t lagging behind and are attempting to solid a really extensive web to compromise any (software program) developer that may appear fascinating to them, leading to exfiltration of delicate knowledge and crypto pockets data,” the researchers concluded.
“Using professional web sites resembling JSON Keeper, JSON Silo and npoint.io, together with code repositories resembling GitLab and GitHub, underlines the actor’s motivation and sustained makes an attempt to function stealthily and mix in with regular site visitors.”

The Hacker News Tags:Channels, Covert, Delivery, Hackers, JSON, Korean, Malware, North, Services, Turn

Post navigation

Previous Post: CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls
Next Post: Beware of Phishing Emails as Spam Filter Alerts Steal Your Email Logins in a Blink

Related Posts

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign The Hacker News
Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors The Hacker News
Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms The Hacker News
Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures The Hacker News
B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More The Hacker News
Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News