Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lazarus Group Targets npm and PyPI with Malicious Packages

Lazarus Group Targets npm and PyPI with Malicious Packages

Posted on February 12, 2026 By CWS

Recent investigations by cybersecurity experts have uncovered a series of malicious packages on npm and PyPI, linked to a deceptive recruitment campaign led by the North Korea-associated Lazarus Group. This operation, known as ‘graphalgo’, has been active since May 2025, exploiting platforms such as LinkedIn and Reddit to lure developers.

Deceptive Tactics of the Lazarus Group

The Lazarus Group’s strategy involves posing as a legitimate company, Veltrix Capital, supposedly operating in the blockchain and cryptocurrency industry. By creating an illusion of authenticity, they reach out to developers with fake job offers. These developers are then directed to repositories on GitHub, designed to appear as part of coding assessments, which secretly harbor malicious code.

While the repositories themselves seem benign, the danger lies in the dependencies hosted on npm and PyPI. These dependencies, once incorporated into projects by unsuspecting developers, execute harmful payloads on the developers’ systems. The npm package ‘bigmathutils’, for example, had over 10,000 downloads before its second, compromised version was released.

Technical Breakdown of the Attack

The malicious packages are primarily conduits for deploying a remote access trojan (RAT). This RAT can execute various commands, such as gathering system information and manipulating files, all communicated through a secure token-based system. This method was previously seen in 2023 campaigns by another North Korean hacking group, Jade Sleet.

Once the system is compromised, the RAT communicates with an external server, confirming its legitimacy through a token exchanged during the initial connection. This ensures that only infected systems can interact with the server, maintaining the operation’s stealth.

Broader Implications and Ongoing Threats

The findings highlight the persistent threat posed by state-sponsored actors like the Lazarus Group, who continuously target open-source ecosystems. Their sophisticated operations aim not only to steal sensitive information but also to execute financial theft, as indicated by the RAT’s ability to detect the MetaMask browser extension.

In a related development, JFrog has reported discovering another malicious npm package, ‘duer-js’, which acts as an information stealer targeting Windows systems. This package collects data such as browser details and cryptocurrency wallet information, exploiting Discord as a channel for data exfiltration.

These revelations underscore the importance of vigilance in the open-source community and the need for robust security measures to protect against such insidious threats. As these campaigns evolve, developers must remain alert to avoid falling victim to these sophisticated traps.

The Hacker News Tags:Blockchain, Cryptocurrency, Cybersecurity, Lazarus Group, malicious packages, North Korea, NPM, open source security, PyPI, RAT

Post navigation

Previous Post: DragonForce Ransomware Group’s Expanding Cartel Operations
Next Post: Odido Telecom Hacked: 6.2 Million Accounts Compromised

Related Posts

Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover The Hacker News
New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events The Hacker News
New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus The Hacker News
STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware The Hacker News
Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents The Hacker News
WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News