Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

‘Wasn’t built right from the start’ — Musk’s xAI starts all over again

AI mental illness lawyer warns of risk of mass casualties

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korean hacker floods NPM registry with Xorindex malware in ongoing attack campaign
Identity

North Korean hacker floods NPM registry with Xorindex malware in ongoing attack campaign

userBy userJuly 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 15th, 2025Ravi LakshmananMalware/Web Security

NPM Registry Using Xorindex Malware

North Korean threat actors linked to the infectious interview campaign have published another set of 67 malicious packages in the NPM registry, highlighting their ongoing attempts to poison the open source ecosystem via software supply chain attacks.

The per-socket package attracts over 17,000 downloads and incorporates Xorindex, a previously undocumented version of the malware loader codename. This activity is an extension of the attack wave discovered last month, and includes a distribution of 35 npm packages deployed another loader called Hexebal.

Cybersecurity

“The infectious interview operations follow the mall dynamics where defenders detect and report malicious packages. North Korean threat actors respond quickly by uploading new variants using the same, similar or slightly evolved playbook.”

The contagious interview is the name assigned to a long-standing campaign that attempts to seduce developers as part of a coding assignment aimed at downloading and running open source projects. First published in late 2023, this threat cluster is also being tracked as a fake development, the famous Cholima, Gwishin gang, tenacious Punsan, UNC5342, and void dokkaebi.

The activity is considered to complement Pyongyang’s infamous Remote Information Technology (IT) worker scheme, employing a strategy that targets developers already employed by interested companies rather than applying for a job.

Attack chaining using malicious NPM packages is fairly simple in that it acts as a conduit for known JavaScript Loader and Stealer known as Beavertail. It is used to extract data from web browsers and cryptocurrency wallets and to deploy a Python backdoor called Invisibleferret.

“The two campaigns are currently operating in parallel. Xorindex has accumulated over 9,000 downloads in short windows (June to July 2025), while Hexebal continues at a steady pace, with over 8,000 additional downloads across the newly discovered package,” says Boychenko.

The Xorindex loader, like Hexeval, profiles compromised machines and uses endpoints associated with hard-coded command and control (C2) infrastructure to obtain the host’s external IP address. The collected information becomes a beacon on the remote server, and then Beavertail is launched.

Cybersecurity

Further analysis of these packages revealed a stable evolution of the loader, moving from a naked bone prototype to sophisticated stealth malware. The early iterations have been found to lack obfuscation and reconnaissance capabilities, but they keep core functionality intact, with second and third generation versions introducing rudimentary systems reconnaissance capabilities.

“The threat actors of contagious interviews will continue to diversify their malware portfolio, spinning through new NPM maintainer alias, reusing loaders such as malware families such as Hexe Bar Loader and Beaverwelter, and actively deploying newly observed variations such as Xorindex loaders,” Boychenko said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRussian volcanoes cultivate “devil’s horns” and spit out a long, 1,000-mile river of smoke – Earth from space
Next Article How Elestor Hydrogen Iron Flow Strengthens Energy Resilience in Europe
user
  • Website

Related Posts

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

March 14, 2026

Chinese hackers target Southeast Asian militaries with AppleChris and MemFun malware

March 13, 2026

Meta to end Instagram’s end-to-end encrypted chat support starting May 2026

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

‘Wasn’t built right from the start’ — Musk’s xAI starts all over again

AI mental illness lawyer warns of risk of mass casualties

Digg lays off staff and closes app as company reorganizes

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.