Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DPRK Cyber Attacks Exploit AI and npm Malware

DPRK Cyber Attacks Exploit AI and npm Malware

Posted on April 29, 2026 By CWS

Recent investigations by cybersecurity experts have unearthed sophisticated cyber attacks originating from North Korea, employing AI-generated npm malware and fake companies to compromise systems. This campaign, dubbed PromptMink, is attributed to the infamous North Korean group, Famous Chollima, also known for the Contagious Interview and IT Worker scams.

AI-Powered npm Malware

The npm package in question, ‘@validate-sdk/v2’, masquerades as a tool for secure development but is designed to extract sensitive information from victim environments. The package shows signs of AI involvement, evident from its generative coding style. Originally uploaded in October 2025, this package is part of a broader scheme involving various npm dependencies.

ReversingLabs, who identified the campaign, notes that the malware’s introduction occurred in a February 2026 commit linked to a Solana blockchain-related project. This package, ‘@solana-launchpad/sdk’, is part of a network of dependencies that collectively enable unauthorized access to cryptocurrency wallets.

Complex Attack Strategies

The attack strategy involves multiple layers, where initial packages appear benign while second-layer packages carry malicious code. These secondary packages are swiftly replaced if detected, ensuring continued operation. First-layer packages like ‘@meme-sdk/trade’ and ‘@solmasterv3/solana-metadata-sdk’ are widely used, aiding in the malware’s stealth.

Techniques such as typosquatting and creating malicious versions of popular functions are employed to evade detection. The campaign’s evolution includes targeting Python’s PyPI with similar tactics, leveraging remote access tools, and exfiltrating data from compromised systems.

Broader Implications and Future Outlook

The ongoing threat from DPRK-aligned hackers underscores the vulnerabilities in the open-source ecosystem. With tactics such as social engineering and creating fake companies, these actors continue to exploit developers’ trust in npm and PyPI repositories. Recent efforts include the creation of fake job offers and utilizing GitHub-hosted malicious dependencies.

As these attacks evolve, cybersecurity experts emphasize the need for enhanced vigilance and improved detection mechanisms to protect against such sophisticated threats. Organizations and developers in the cryptocurrency and blockchain sectors, in particular, must remain alert to the potential risks posed by these state-sponsored operations.

In conclusion, the DPRK’s use of AI and layered malware strategies in cyber attacks represents a significant challenge to digital security. The ongoing campaigns highlight the importance of robust security practices and the need for continuous monitoring to thwart these advanced threats.

The Hacker News Tags:AI malware, Claude Opus, Cryptocurrency, Cybersecurity, DPRK, fake firms, FAMOUS CHOLLIMA, North Korea, npm packages, open source security, PromptMink, RATs, ReversingLabs, supply chain attacks, transitive dependencies

Post navigation

Previous Post: SLOTAGENT Malware Evades Detection with Advanced Techniques
Next Post: Vimeo Data Breach Exposes User Database Details

Related Posts

OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors The Hacker News
Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network The Hacker News
Warlock Ransomware Exploits Unpatched SmarterMail Server Warlock Ransomware Exploits Unpatched SmarterMail Server The Hacker News
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection The Hacker News
China-Linked DKnife Framework Exploits Routers for Attacks China-Linked DKnife Framework Exploits Routers for Attacks The Hacker News
North Korean Group Linked to Axios npm Attack North Korean Group Linked to Axios npm Attack The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Alerts on Critical Windows Shell Vulnerability
  • Credential-Stealing Attack Hits SAP npm Packages
  • Vimeo Data Breach Exposes User Database Details
  • DPRK Cyber Attacks Exploit AI and npm Malware
  • SLOTAGENT Malware Evades Detection with Advanced Techniques

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Alerts on Critical Windows Shell Vulnerability
  • Credential-Stealing Attack Hits SAP npm Packages
  • Vimeo Data Breach Exposes User Database Details
  • DPRK Cyber Attacks Exploit AI and npm Malware
  • SLOTAGENT Malware Evades Detection with Advanced Techniques

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark