Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lazarus Group Targets npm and PyPI with Malicious Packages

Lazarus Group Targets npm and PyPI with Malicious Packages

Posted on February 12, 2026 By CWS

Recent investigations by cybersecurity experts have uncovered a series of malicious packages on npm and PyPI, linked to a deceptive recruitment campaign led by the North Korea-associated Lazarus Group. This operation, known as ‘graphalgo’, has been active since May 2025, exploiting platforms such as LinkedIn and Reddit to lure developers.

Deceptive Tactics of the Lazarus Group

The Lazarus Group’s strategy involves posing as a legitimate company, Veltrix Capital, supposedly operating in the blockchain and cryptocurrency industry. By creating an illusion of authenticity, they reach out to developers with fake job offers. These developers are then directed to repositories on GitHub, designed to appear as part of coding assessments, which secretly harbor malicious code.

While the repositories themselves seem benign, the danger lies in the dependencies hosted on npm and PyPI. These dependencies, once incorporated into projects by unsuspecting developers, execute harmful payloads on the developers’ systems. The npm package ‘bigmathutils’, for example, had over 10,000 downloads before its second, compromised version was released.

Technical Breakdown of the Attack

The malicious packages are primarily conduits for deploying a remote access trojan (RAT). This RAT can execute various commands, such as gathering system information and manipulating files, all communicated through a secure token-based system. This method was previously seen in 2023 campaigns by another North Korean hacking group, Jade Sleet.

Once the system is compromised, the RAT communicates with an external server, confirming its legitimacy through a token exchanged during the initial connection. This ensures that only infected systems can interact with the server, maintaining the operation’s stealth.

Broader Implications and Ongoing Threats

The findings highlight the persistent threat posed by state-sponsored actors like the Lazarus Group, who continuously target open-source ecosystems. Their sophisticated operations aim not only to steal sensitive information but also to execute financial theft, as indicated by the RAT’s ability to detect the MetaMask browser extension.

In a related development, JFrog has reported discovering another malicious npm package, ‘duer-js’, which acts as an information stealer targeting Windows systems. This package collects data such as browser details and cryptocurrency wallet information, exploiting Discord as a channel for data exfiltration.

These revelations underscore the importance of vigilance in the open-source community and the need for robust security measures to protect against such insidious threats. As these campaigns evolve, developers must remain alert to avoid falling victim to these sophisticated traps.

The Hacker News Tags:Blockchain, Cryptocurrency, Cybersecurity, Lazarus Group, malicious packages, North Korea, NPM, open source security, PyPI, RAT

Post navigation

Previous Post: DragonForce Ransomware Group’s Expanding Cartel Operations
Next Post: Odido Telecom Hacked: 6.2 Million Accounts Compromised

Related Posts

FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available The Hacker News
MuddyWater Exploits Teams for Credential Theft in Covert Attack MuddyWater Exploits Teams for Credential Theft in Covert Attack The Hacker News
Hard-Coded Credentials Found in HPE Instant On Devices Allow Admin Access Hard-Coded Credentials Found in HPE Instant On Devices Allow Admin Access The Hacker News
Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks The Hacker News
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV The Hacker News
Warning on Malicious KICS Docker Images and Extensions Warning on Malicious KICS Docker Images and Extensions The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems
  • AI Hallucinations Pose New Security Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems
  • AI Hallucinations Pose New Security Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark