Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

State-backed HagyBeacon malware uses AWS Lambda to steal data from SE Asian government

How to protect invisible identity access

The UK and Czech Republic establish a deal for landmark small modular reactors

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korean hacker floods NPM registry with Xorindex malware in ongoing attack campaign
Identity

North Korean hacker floods NPM registry with Xorindex malware in ongoing attack campaign

userBy userJuly 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 15th, 2025Ravi LakshmananMalware/Web Security

NPM Registry Using Xorindex Malware

North Korean threat actors linked to the infectious interview campaign have published another set of 67 malicious packages in the NPM registry, highlighting their ongoing attempts to poison the open source ecosystem via software supply chain attacks.

The per-socket package attracts over 17,000 downloads and incorporates Xorindex, a previously undocumented version of the malware loader codename. This activity is an extension of the attack wave discovered last month, and includes a distribution of 35 npm packages deployed another loader called Hexebal.

Cybersecurity

“The infectious interview operations follow the mall dynamics where defenders detect and report malicious packages. North Korean threat actors respond quickly by uploading new variants using the same, similar or slightly evolved playbook.”

The contagious interview is the name assigned to a long-standing campaign that attempts to seduce developers as part of a coding assignment aimed at downloading and running open source projects. First published in late 2023, this threat cluster is also being tracked as a fake development, the famous Cholima, Gwishin gang, tenacious Punsan, UNC5342, and void dokkaebi.

The activity is considered to complement Pyongyang’s infamous Remote Information Technology (IT) worker scheme, employing a strategy that targets developers already employed by interested companies rather than applying for a job.

Attack chaining using malicious NPM packages is fairly simple in that it acts as a conduit for known JavaScript Loader and Stealer known as Beavertail. It is used to extract data from web browsers and cryptocurrency wallets and to deploy a Python backdoor called Invisibleferret.

“The two campaigns are currently operating in parallel. Xorindex has accumulated over 9,000 downloads in short windows (June to July 2025), while Hexebal continues at a steady pace, with over 8,000 additional downloads across the newly discovered package,” says Boychenko.

The Xorindex loader, like Hexeval, profiles compromised machines and uses endpoints associated with hard-coded command and control (C2) infrastructure to obtain the host’s external IP address. The collected information becomes a beacon on the remote server, and then Beavertail is launched.

Cybersecurity

Further analysis of these packages revealed a stable evolution of the loader, moving from a naked bone prototype to sophisticated stealth malware. The early iterations have been found to lack obfuscation and reconnaissance capabilities, but they keep core functionality intact, with second and third generation versions introducing rudimentary systems reconnaissance capabilities.

“The threat actors of contagious interviews will continue to diversify their malware portfolio, spinning through new NPM maintainer alias, reusing loaders such as malware families such as Hexe Bar Loader and Beaverwelter, and actively deploying newly observed variations such as Xorindex loaders,” Boychenko said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe Great Lakes city is advertised as a climate shelter. The reality is much more complicated.
Next Article How Elestor Hydrogen Iron Flow Strengthens Energy Resilience in Europe
user
  • Website

Related Posts

State-backed HagyBeacon malware uses AWS Lambda to steal data from SE Asian government

July 15, 2025

How to protect invisible identity access

July 15, 2025

Unusual suspect: Git Repos

July 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

State-backed HagyBeacon malware uses AWS Lambda to steal data from SE Asian government

How to protect invisible identity access

The UK and Czech Republic establish a deal for landmark small modular reactors

The role of hybrid energy storage in the European energy transition.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.