Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

Posted on July 15, 2025July 15, 2025 By CWS

Jul 15, 2025Ravie LakshmananMalware / Net Safety
The North Korean risk actors linked to the Contagious Interview marketing campaign have been noticed publishing one other set of 67 malicious packages to the npm registry, underscoring ongoing makes an attempt to poison the open-source ecosystem through software program provide chain assaults.
The packages, per Socket, have attracted greater than 17,000 downloads, and incorporate a beforehand undocumented model of a malware loader codenamed XORIndex. The exercise is an enlargement of an assault wave noticed final month that concerned the distribution of 35 npm packages that deployed one other loader known as HexEval.

“The Contagious Interview operation continues to comply with a whack-a-mole dynamic, the place defenders detect and report malicious packages, and North Korean risk actors rapidly reply by importing new variants utilizing the identical, related, or barely developed playbooks,” Socket researcher Kirill Boychenko mentioned.
Contagious Interview is the identify assigned to a long-running marketing campaign that seeks to entice builders into downloading and executing an open-source mission as a part of a purported coding task. First publicly disclosed in late 2023, the risk cluster can be tracked as DeceptiveDevelopment, Well-known Chollima, Gwisin Gang, Tenacious Pungsan, UNC5342, and Void Dokkaebi.
The exercise is believed to be complementary to Pyongyang’s notorious distant data know-how (IT) employee scheme, adopting the technique of concentrating on builders already employed in firms of curiosity relatively than making use of for a job.

The assault chains utilizing malicious npm packages are pretty simple in that they function a conduit for a recognized JavaScript loader and stealer referred to as BeaverTail, which is subsequently used to extract knowledge from net browsers and cryptocurrency wallets, in addition to deploy a Python backdoor known as InvisibleFerret.
“The 2 campaigns now function in parallel. XORIndex has accrued over 9,000 downloads in a brief window (June to July 2025), whereas HexEval continues at a gradual tempo, with greater than 8,000 further downloads throughout the newly found packages,” Boychenko mentioned.
The XORIndex Loader, like HexEval, profiles the compromised machine and makes use of endpoints related to hard-coded command-and-control (C2) infrastructure to acquire the exterior IP deal with of the host. The collected data is then beaconed to a distant server, after which BeaverTail is launched.

Additional evaluation of those packages has uncovered a gradual evolution of the loader, progressing from a bare-bones prototype to a classy, stealthier malware. Early iterations have been discovered to lack in obfuscation and reconnaissance capabilities, whereas preserving their core performance intact, with second and third-generation variations introducing rudimentary system reconnaissance capabilities.
“Contagious Interview risk actors will proceed to diversify their malware portfolio, rotating by means of new npm maintainer aliases, reusing loaders similar to HexEval Loader and malware households like BeaverTail and InvisibleFerret, and actively deploying newly noticed variants together with XORIndex Loader,” Boychenko mentioned.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Attack, Campaign, Flood, Hackers, Korean, Malware, North, NPM, Ongoing, Registry, XORIndex

Post navigation

Previous Post: MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats 
Next Post: Ransomware Group Claims Attack on Belk

Related Posts

Npm Packages Exploit Crypto Keys and CI Secrets Npm Packages Exploit Crypto Keys and CI Secrets The Hacker News
GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites The Hacker News
How to Address the Expanding Security Risk How to Address the Expanding Security Risk The Hacker News
Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; M Stolen in Crypto Heist Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist The Hacker News
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers The Hacker News
Enhancing npm’s Supply Chain Security: Key Updates and Future Steps Enhancing npm’s Supply Chain Security: Key Updates and Future Steps The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark