Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DPRK Cyber Attacks Exploit AI and npm Malware

DPRK Cyber Attacks Exploit AI and npm Malware

Posted on April 29, 2026 By CWS

Recent investigations by cybersecurity experts have unearthed sophisticated cyber attacks originating from North Korea, employing AI-generated npm malware and fake companies to compromise systems. This campaign, dubbed PromptMink, is attributed to the infamous North Korean group, Famous Chollima, also known for the Contagious Interview and IT Worker scams.

AI-Powered npm Malware

The npm package in question, ‘@validate-sdk/v2’, masquerades as a tool for secure development but is designed to extract sensitive information from victim environments. The package shows signs of AI involvement, evident from its generative coding style. Originally uploaded in October 2025, this package is part of a broader scheme involving various npm dependencies.

ReversingLabs, who identified the campaign, notes that the malware’s introduction occurred in a February 2026 commit linked to a Solana blockchain-related project. This package, ‘@solana-launchpad/sdk’, is part of a network of dependencies that collectively enable unauthorized access to cryptocurrency wallets.

Complex Attack Strategies

The attack strategy involves multiple layers, where initial packages appear benign while second-layer packages carry malicious code. These secondary packages are swiftly replaced if detected, ensuring continued operation. First-layer packages like ‘@meme-sdk/trade’ and ‘@solmasterv3/solana-metadata-sdk’ are widely used, aiding in the malware’s stealth.

Techniques such as typosquatting and creating malicious versions of popular functions are employed to evade detection. The campaign’s evolution includes targeting Python’s PyPI with similar tactics, leveraging remote access tools, and exfiltrating data from compromised systems.

Broader Implications and Future Outlook

The ongoing threat from DPRK-aligned hackers underscores the vulnerabilities in the open-source ecosystem. With tactics such as social engineering and creating fake companies, these actors continue to exploit developers’ trust in npm and PyPI repositories. Recent efforts include the creation of fake job offers and utilizing GitHub-hosted malicious dependencies.

As these attacks evolve, cybersecurity experts emphasize the need for enhanced vigilance and improved detection mechanisms to protect against such sophisticated threats. Organizations and developers in the cryptocurrency and blockchain sectors, in particular, must remain alert to the potential risks posed by these state-sponsored operations.

In conclusion, the DPRK’s use of AI and layered malware strategies in cyber attacks represents a significant challenge to digital security. The ongoing campaigns highlight the importance of robust security practices and the need for continuous monitoring to thwart these advanced threats.

The Hacker News Tags:AI malware, Claude Opus, Cryptocurrency, Cybersecurity, DPRK, fake firms, FAMOUS CHOLLIMA, North Korea, npm packages, open source security, PromptMink, RATs, ReversingLabs, supply chain attacks, transitive dependencies

Post navigation

Previous Post: SLOTAGENT Malware Evades Detection with Advanced Techniques
Next Post: Vimeo Data Breach Exposes User Database Details

Related Posts

Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool The Hacker News
PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution The Hacker News
eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware The Hacker News
Why You Should Swap Passwords for Passphrases Why You Should Swap Passwords for Passphrases The Hacker News
Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools The Hacker News
Iraqi Officials Targeted by New Malware Campaign Iraqi Officials Targeted by New Malware Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SAP npm Packages Breached in Credential Theft Attack
  • CISA Alerts on Critical Windows Shell Vulnerability
  • Credential-Stealing Attack Hits SAP npm Packages
  • Vimeo Data Breach Exposes User Database Details
  • DPRK Cyber Attacks Exploit AI and npm Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SAP npm Packages Breached in Credential Theft Attack
  • CISA Alerts on Critical Windows Shell Vulnerability
  • Credential-Stealing Attack Hits SAP npm Packages
  • Vimeo Data Breach Exposes User Database Details
  • DPRK Cyber Attacks Exploit AI and npm Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark