Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korean hacker floods NPM registry with Xorindex malware in ongoing attack campaign
Identity

North Korean hacker floods NPM registry with Xorindex malware in ongoing attack campaign

userBy userJuly 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 15th, 2025Ravi LakshmananMalware/Web Security

NPM Registry Using Xorindex Malware

North Korean threat actors linked to the infectious interview campaign have published another set of 67 malicious packages in the NPM registry, highlighting their ongoing attempts to poison the open source ecosystem via software supply chain attacks.

The per-socket package attracts over 17,000 downloads and incorporates Xorindex, a previously undocumented version of the malware loader codename. This activity is an extension of the attack wave discovered last month, and includes a distribution of 35 npm packages deployed another loader called Hexebal.

Cybersecurity

“The infectious interview operations follow the mall dynamics where defenders detect and report malicious packages. North Korean threat actors respond quickly by uploading new variants using the same, similar or slightly evolved playbook.”

The contagious interview is the name assigned to a long-standing campaign that attempts to seduce developers as part of a coding assignment aimed at downloading and running open source projects. First published in late 2023, this threat cluster is also being tracked as a fake development, the famous Cholima, Gwishin gang, tenacious Punsan, UNC5342, and void dokkaebi.

The activity is considered to complement Pyongyang’s infamous Remote Information Technology (IT) worker scheme, employing a strategy that targets developers already employed by interested companies rather than applying for a job.

Attack chaining using malicious NPM packages is fairly simple in that it acts as a conduit for known JavaScript Loader and Stealer known as Beavertail. It is used to extract data from web browsers and cryptocurrency wallets and to deploy a Python backdoor called Invisibleferret.

“The two campaigns are currently operating in parallel. Xorindex has accumulated over 9,000 downloads in short windows (June to July 2025), while Hexebal continues at a steady pace, with over 8,000 additional downloads across the newly discovered package,” says Boychenko.

The Xorindex loader, like Hexeval, profiles compromised machines and uses endpoints associated with hard-coded command and control (C2) infrastructure to obtain the host’s external IP address. The collected information becomes a beacon on the remote server, and then Beavertail is launched.

Cybersecurity

Further analysis of these packages revealed a stable evolution of the loader, moving from a naked bone prototype to sophisticated stealth malware. The early iterations have been found to lack obfuscation and reconnaissance capabilities, but they keep core functionality intact, with second and third generation versions introducing rudimentary systems reconnaissance capabilities.

“The threat actors of contagious interviews will continue to diversify their malware portfolio, spinning through new NPM maintainer alias, reusing loaders such as malware families such as Hexe Bar Loader and Beaverwelter, and actively deploying newly observed variations such as Xorindex loaders,” Boychenko said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRussian volcanoes cultivate “devil’s horns” and spit out a long, 1,000-mile river of smoke – Earth from space
Next Article How Elestor Hydrogen Iron Flow Strengthens Energy Resilience in Europe
user
  • Website

Related Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Eightfold Co-Founder Raises $35M for Viven, AI Digital Twin Startup Contacts Missed Colleagues

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.