Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects

Posted on November 14, 2025November 14, 2025 By CWS

Cybersecurity researchers have uncovered a classy marketing campaign the place risk actors abuse official JSON storage companies to ship malware to software program builders.

The marketing campaign, often called Contagious Interview, represents a big shift in how attackers are concealing malicious payloads inside seemingly official improvement tasks.

By exploiting platforms comparable to JSON Keeper, JSONsilo, and npoint.io, risk actors have discovered a solution to mix malicious code supply into official visitors, making detection more and more troublesome.

The Contagious Interview marketing campaign has been energetic since at the least 2023 and is aligned with Democratic Individuals’s Republic of Korea (DPRK) actors.

The operation particularly targets software program builders throughout Home windows, Linux, and macOS methods, with specific give attention to these working in cryptocurrency and Web3 tasks.

The attackers’ purpose is monetary acquire, aiming to steal delicate data and digital belongings from victims.

Preliminary entry is gained by means of meticulously crafted social engineering ways, the place faux recruiters method potential victims on job looking platforms like LinkedIn with compelling job alternatives.

The assault sometimes begins with a professionally crafted message from a faux recruiter claiming to signify a official firm engaged on actual property or Web3 tasks.

Overview of the Contagious Interview malware marketing campaign (Supply – NVISO Labs)

After a number of messages exchanging pleasantries and discussing the function, the recruiter shares a demo mission hosted on GitLab or GitHub as a part of an interview evaluation.

NVISO Labs safety analysts recognized that this method efficiently tips builders into downloading and executing trojanized code.

Assault Mechanism

The demo tasks seem official, that includes detailed readme recordsdata {and professional} layouts that showcase actual property platforms or cryptocurrency functions, making a convincing facade.

InvisibleFerret’s Pastebin performance (Supply – NVISO Labs)

As soon as builders obtain and run the tasks utilizing Node.js, the an infection chain begins. The actual technical cleverness lies in how the malware is delivered.

Configuration recordsdata inside these tasks comprise base64-encoded variables that masks JSON storage service URLs. When decoded, these variables reveal hyperlinks to JSON Keeper or related platforms internet hosting closely obfuscated JavaScript code.

This code is robotically fetched and executed by means of official Node.js operations, making it troublesome for conventional safety instruments to catch the assault.

The obfuscated JavaScript fetches the BeaverTail infostealer, which makes a speciality of stealing pockets data, system information, and browser extension data associated to cryptocurrency.

Following BeaverTail execution, the InvisibleFerret Distant Entry Device is deployed in subsequent phases.

This modular framework, written in Python, carries a number of capabilities, together with information exfiltration, system fingerprinting, and downloading extra payloads.

The assault chain continues by means of a number of phases, using official companies like Pastebin and Railway to host payloads and evade detection.

What distinguishes this marketing campaign is the attacker’s refined use of official infrastructure to keep away from detection.

By internet hosting malware by means of extensively used JSON storage companies and code repositories, the risk actors guarantee their visitors seems regular.

Organizations ought to train excessive warning when receiving unsolicited code from recruiters or any unknown sources.

Inspecting configuration recordsdata for suspicious API keys and monitoring Node.js execution behaviors can assist determine and stop related assaults earlier than the risk establishes itself throughout the community.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Code, Deliver, Host, JSON, Leverage, Malware, Projects, Services, Storage, Threat, Trojanized

Post navigation

Previous Post: Akira Ransomware Group Made $244 Million in Ransom Proceeds
Next Post: Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack

Related Posts

Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code Cyber Security News
Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability Cyber Security News
Threat Actors Using Weaponized AV-themed Word and PDF Documents to Attack Israeli Organizations Cyber Security News
New Text Message Based Phishing Attack from China Targeting Users Around the Globe Cyber Security News
Top 5 WMIC Commands Used By Malware  Cyber Security News
Bloody Wolf Hackers Mimic as Government Agencies to Deploy NetSupport RAT via Weaponized PDF’s Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
  • New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
  • Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
  • New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
  • Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark