Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

North Korean hackers turn JSON service into covert malware delivery channel

Five people plead guilty to helping North Koreans infiltrate US companies as ‘remote IT workers’

Researchers discover serious AI bug exposing Meta, Nvidia, and Microsoft inference frameworks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korean hackers turn JSON service into covert malware delivery channel
Identity

North Korean hackers turn JSON service into covert malware delivery channel

userBy userNovember 14, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 14, 2025Ravi LakshmananMalware/Threat Intelligence

Malware distribution channels

The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage their malicious payloads.

NVISO researchers Bart Parys, Stef Collart, and Efstratios Lontzetidis said in a Thursday report that “attackers have recently been using JSON storage services such as JSON Keeper, JSONsilo, and npoint.io to host and distribute malware from trojanized code projects.”

The campaign essentially approaches potential targets on professional networking sites such as LinkedIn under the pretext of conducting a job evaluation or collaborating on a project, and as part of this, they are instructed to download demo projects hosted on platforms such as GitHub, GitLab, and Bitbucket.

In one such project discovered by NVISO, a file named “server/config/.config.env” contained a Base64-encoded value disguised as an API key, but was actually found to be a URL to a JSON storage service, such as JSON Keeper, where the next stage payload was stored in an obfuscated format.

CIS build kit

The payload is a JavaScript malware known as BeaverTail that has the ability to collect sensitive data and drop a Python backdoor called InvisibleFerret. The backdoor’s functionality has remained largely unchanged since it was first documented by Palo Alto Networks in late 2023, but one notable change is that it obtains an additional payload from Pastebin called TsunamiKit.

It is worth noting that the use of TsunamiKit as part of the Contagious Interview campaign was highlighted by ESET in September 2025, and that attack also dropped Tropidoor and AkdoorTea. This toolkit is capable of system fingerprinting, data collection, and fetching additional payloads from hardcoded .onion addresses that are currently offline.

“It is clear that the attackers behind Contagious Interviews are not far behind and are attempting to cast a very wide net to compromise potentially interested (software) developers, resulting in the exposure of sensitive data and cryptocurrency wallet information,” the researchers concluded.

“The use of legitimate websites such as JSON Keeper, JSON Silo, and npoint.io, as well as code repositories such as GitLab and GitHub, highlights the attacker’s motivations and continued attempts to operate covertly and blend in with normal traffic.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFive people plead guilty to helping North Koreans infiltrate US companies as ‘remote IT workers’
user
  • Website

Related Posts

Researchers discover serious AI bug exposing Meta, Nvidia, and Microsoft inference frameworks

November 14, 2025

Iranian hackers launch espionage operation ‘Spear Specter’ targeting national defense and government

November 14, 2025

LockBit is back, but ransomware fragmentation reaches breaking point

November 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

North Korean hackers turn JSON service into covert malware delivery channel

Five people plead guilty to helping North Koreans infiltrate US companies as ‘remote IT workers’

Researchers discover serious AI bug exposing Meta, Nvidia, and Microsoft inference frameworks

Pine Labs receives enthusiastic reception from market with $440 million Indian IPO despite valuation cut

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.