Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects

Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects

Posted on November 14, 2025November 14, 2025 By CWS

Cybersecurity researchers have uncovered a classy marketing campaign the place risk actors abuse official JSON storage companies to ship malware to software program builders.

The marketing campaign, often called Contagious Interview, represents a big shift in how attackers are concealing malicious payloads inside seemingly official improvement tasks.

By exploiting platforms comparable to JSON Keeper, JSONsilo, and npoint.io, risk actors have discovered a solution to mix malicious code supply into official visitors, making detection more and more troublesome.

The Contagious Interview marketing campaign has been energetic since at the least 2023 and is aligned with Democratic Individuals’s Republic of Korea (DPRK) actors.

The operation particularly targets software program builders throughout Home windows, Linux, and macOS methods, with specific give attention to these working in cryptocurrency and Web3 tasks.

The attackers’ purpose is monetary acquire, aiming to steal delicate data and digital belongings from victims.

Preliminary entry is gained by means of meticulously crafted social engineering ways, the place faux recruiters method potential victims on job looking platforms like LinkedIn with compelling job alternatives.

The assault sometimes begins with a professionally crafted message from a faux recruiter claiming to signify a official firm engaged on actual property or Web3 tasks.

Overview of the Contagious Interview malware marketing campaign (Supply – NVISO Labs)

After a number of messages exchanging pleasantries and discussing the function, the recruiter shares a demo mission hosted on GitLab or GitHub as a part of an interview evaluation.

NVISO Labs safety analysts recognized that this method efficiently tips builders into downloading and executing trojanized code.

Assault Mechanism

The demo tasks seem official, that includes detailed readme recordsdata {and professional} layouts that showcase actual property platforms or cryptocurrency functions, making a convincing facade.

InvisibleFerret’s Pastebin performance (Supply – NVISO Labs)

As soon as builders obtain and run the tasks utilizing Node.js, the an infection chain begins. The actual technical cleverness lies in how the malware is delivered.

Configuration recordsdata inside these tasks comprise base64-encoded variables that masks JSON storage service URLs. When decoded, these variables reveal hyperlinks to JSON Keeper or related platforms internet hosting closely obfuscated JavaScript code.

This code is robotically fetched and executed by means of official Node.js operations, making it troublesome for conventional safety instruments to catch the assault.

The obfuscated JavaScript fetches the BeaverTail infostealer, which makes a speciality of stealing pockets data, system information, and browser extension data associated to cryptocurrency.

Following BeaverTail execution, the InvisibleFerret Distant Entry Device is deployed in subsequent phases.

This modular framework, written in Python, carries a number of capabilities, together with information exfiltration, system fingerprinting, and downloading extra payloads.

The assault chain continues by means of a number of phases, using official companies like Pastebin and Railway to host payloads and evade detection.

What distinguishes this marketing campaign is the attacker’s refined use of official infrastructure to keep away from detection.

By internet hosting malware by means of extensively used JSON storage companies and code repositories, the risk actors guarantee their visitors seems regular.

Organizations ought to train excessive warning when receiving unsolicited code from recruiters or any unknown sources.

Inspecting configuration recordsdata for suspicious API keys and monitoring Node.js execution behaviors can assist determine and stop related assaults earlier than the risk establishes itself throughout the community.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Code, Deliver, Host, JSON, Leverage, Malware, Projects, Services, Storage, Threat, Trojanized

Post navigation

Previous Post: Akira Ransomware Group Made $244 Million in Ransom Proceeds
Next Post: Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack

Related Posts

Phantom Stealer Attacking Users to Steal Sensitive Data like Passwords, Browser Cookies, Credit Card Data Phantom Stealer Attacking Users to Steal Sensitive Data like Passwords, Browser Cookies, Credit Card Data Cyber Security News
Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Cyber Security News
Critical AWS-LC Vulnerabilities Expose Security Risks Critical AWS-LC Vulnerabilities Expose Security Risks Cyber Security News
New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories Cyber Security News
Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs Cyber Security News
EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark