Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects

Posted on November 14, 2025November 14, 2025 By CWS

Cybersecurity researchers have uncovered a classy marketing campaign the place risk actors abuse official JSON storage companies to ship malware to software program builders.

The marketing campaign, often called Contagious Interview, represents a big shift in how attackers are concealing malicious payloads inside seemingly official improvement tasks.

By exploiting platforms comparable to JSON Keeper, JSONsilo, and npoint.io, risk actors have discovered a solution to mix malicious code supply into official visitors, making detection more and more troublesome.

The Contagious Interview marketing campaign has been energetic since at the least 2023 and is aligned with Democratic Individuals’s Republic of Korea (DPRK) actors.

The operation particularly targets software program builders throughout Home windows, Linux, and macOS methods, with specific give attention to these working in cryptocurrency and Web3 tasks.

The attackers’ purpose is monetary acquire, aiming to steal delicate data and digital belongings from victims.

Preliminary entry is gained by means of meticulously crafted social engineering ways, the place faux recruiters method potential victims on job looking platforms like LinkedIn with compelling job alternatives.

The assault sometimes begins with a professionally crafted message from a faux recruiter claiming to signify a official firm engaged on actual property or Web3 tasks.

Overview of the Contagious Interview malware marketing campaign (Supply – NVISO Labs)

After a number of messages exchanging pleasantries and discussing the function, the recruiter shares a demo mission hosted on GitLab or GitHub as a part of an interview evaluation.

NVISO Labs safety analysts recognized that this method efficiently tips builders into downloading and executing trojanized code.

Assault Mechanism

The demo tasks seem official, that includes detailed readme recordsdata {and professional} layouts that showcase actual property platforms or cryptocurrency functions, making a convincing facade.

InvisibleFerret’s Pastebin performance (Supply – NVISO Labs)

As soon as builders obtain and run the tasks utilizing Node.js, the an infection chain begins. The actual technical cleverness lies in how the malware is delivered.

Configuration recordsdata inside these tasks comprise base64-encoded variables that masks JSON storage service URLs. When decoded, these variables reveal hyperlinks to JSON Keeper or related platforms internet hosting closely obfuscated JavaScript code.

This code is robotically fetched and executed by means of official Node.js operations, making it troublesome for conventional safety instruments to catch the assault.

The obfuscated JavaScript fetches the BeaverTail infostealer, which makes a speciality of stealing pockets data, system information, and browser extension data associated to cryptocurrency.

Following BeaverTail execution, the InvisibleFerret Distant Entry Device is deployed in subsequent phases.

This modular framework, written in Python, carries a number of capabilities, together with information exfiltration, system fingerprinting, and downloading extra payloads.

The assault chain continues by means of a number of phases, using official companies like Pastebin and Railway to host payloads and evade detection.

What distinguishes this marketing campaign is the attacker’s refined use of official infrastructure to keep away from detection.

By internet hosting malware by means of extensively used JSON storage companies and code repositories, the risk actors guarantee their visitors seems regular.

Organizations ought to train excessive warning when receiving unsolicited code from recruiters or any unknown sources.

Inspecting configuration recordsdata for suspicious API keys and monitoring Node.js execution behaviors can assist determine and stop related assaults earlier than the risk establishes itself throughout the community.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Code, Deliver, Host, JSON, Leverage, Malware, Projects, Services, Storage, Threat, Trojanized

Post navigation

Previous Post: Akira Ransomware Group Made $244 Million in Ransom Proceeds
Next Post: Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack

Related Posts

Threat Intelligence That Powers Best SOCs Worldwide Is Now Free   Cyber Security News
Lumma Password Stealer Attack Infection Chain and Its Escalation Tactics Uncovered Cyber Security News
Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike Cyber Security News
Microsoft Dismantles 300+ Websites Used to Distribute RaccoonO365 Phishing Service Cyber Security News
North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data Cyber Security News
Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT
  • Checkout.com Discloses Data Breach After Extortion Attempt

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT
  • Checkout.com Discloses Data Breach After Extortion Attempt

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News