Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Exploit npm Packages for Malware

North Korean Hackers Exploit npm Packages for Malware

Posted on March 2, 2026 By CWS

In a concerning development, cybersecurity experts have uncovered a sophisticated campaign by North Korean hackers involving the release of 26 malicious npm packages. These packages, appearing as legitimate development tools, serve as a vehicle for a remote access trojan and credential-stealing malware. The command-and-control (C2) network supporting this operation is hosted across 31 Vercel deployments, utilizing Pastebin as a covert communication channel.

Stealthy Techniques and Infrastructure

The operation, known as StegaBin, employs innovative methods to conceal its activities. According to researchers from Socket and kmsec.uk, steganography plays a crucial role in this campaign. The C2 URLs are hidden within seemingly mundane Pastebin posts, which are actually encoded to reveal critical infrastructure addresses. The hackers have exploited this method to bypass detection and implement a robust evasion strategy.

The list of malicious npm packages includes names such as argonist and bcryptance. Each package features an installation script that triggers a malicious payload, masquerading as legitimate software. These scripts contact Pastebin URLs to decode hidden C2 addresses, which lead to platform-specific payloads targeting Windows, macOS, and Linux systems.

Malicious Payloads and Their Impact

Upon accessing the decoded domains, the malware fetches payloads designed to compromise multiple operating systems. A notable domain, “ext-checkdin.vercel[.]app”, was identified as distributing a shell script that further loads a remote access trojan (RAT). This RAT connects to a command server awaiting instructions, allowing the hackers to execute various malicious activities.

The operation includes nine distinct modules, each tailored for specific tasks such as keylogging, credential theft, and persistent access. Modules like vs exploit Visual Studio Code to maintain access, while others like clip and bro focus on logging keystrokes and extracting browser credentials, respectively.

Implications and Future Outlook

The campaign signifies an evolution in North Korean cyber tactics, showcasing enhanced sophistication in evasion and persistence. The use of character-level steganography and multi-stage routing indicates a strategic shift to thwart both automated and manual detection efforts. Researchers warn of the potential for ongoing threats as the attackers refine their techniques and infrastructure.

Concurrent with this campaign, the North Korean actors have also been using npm packages such as express-core-validator to download secondary payloads from platforms like Google Drive. While only one package has been identified using this new technique, experts anticipate further developments as the adversaries continue to adapt their methods.

As the cybersecurity landscape evolves, vigilance and enhanced detection measures are crucial to counteract these sophisticated threats. Organizations are urged to scrutinize npm packages and implement robust security protocols to mitigate the risk posed by such advanced cyber operations.

The Hacker News Tags:credential stealing, Cybersecurity, Malware, North Korean hackers, npm packages, Pastebin, remote access trojan, Steganography, supply chain attack, Vercel

Post navigation

Previous Post: US Military’s Controversial Use of Claude AI in Iran Strike
Next Post: Critical Angular SSR Flaw Exposes Unauthorized Requests

Related Posts

Europol Arrests XSS Forum Admin in Kyiv After 12-Year Run Operating Cybercrime Marketplace Europol Arrests XSS Forum Admin in Kyiv After 12-Year Run Operating Cybercrime Marketplace The Hacker News
The State of Trusted Open Source The State of Trusted Open Source The Hacker News
Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected The Hacker News
Why It Needs a Modern Approach Why It Needs a Modern Approach The Hacker News
Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild The Hacker News
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign 175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Angular SSR Flaw Exposes Unauthorized Requests
  • North Korean Hackers Exploit npm Packages for Malware
  • US Military’s Controversial Use of Claude AI in Iran Strike
  • Browser Extension Misuse Reveals Security Risks
  • Cyber Attack via Prayer App Amid US-Israel Strikes on Iran

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Angular SSR Flaw Exposes Unauthorized Requests
  • North Korean Hackers Exploit npm Packages for Malware
  • US Military’s Controversial Use of Claude AI in Iran Strike
  • Browser Extension Misuse Reveals Security Risks
  • Cyber Attack via Prayer App Amid US-Israel Strikes on Iran

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News