North Korean hackers spread over 1,700 malicious packages across major code registries

April 13, 20262 min read1 sources
Share:
North Korean hackers spread over 1,700 malicious packages across major code registries

A persistent software supply chain campaign attributed to North Korean threat actors has significantly expanded, publishing over 1,700 malicious packages across multiple open-source code registries. The operation, dubbed “Contagious Interview,” now targets developers in the Go, Rust, and PHP ecosystems in addition to its previous focus on npm for JavaScript and PyPI for Python.

According to security researchers, the malicious packages impersonate legitimate developer tooling and popular libraries. Once a developer installs one of these packages, it functions as a malware loader. This initial component establishes a connection to an attacker-controlled server to download and execute a secondary, more damaging payload. This method gives the attackers an initial foothold on a developer’s machine.

The primary impact is the compromise of development environments, which can lead to the theft of credentials, source code, and other intellectual property. An infected developer machine can also serve as a gateway for attackers to pivot into a company's internal network, escalating the potential damage far beyond a single computer.

The expansion into Go, Rust, and PHP indicates a concerted effort to compromise a broader segment of the software development community. By targeting the foundational building blocks used in modern applications, the attackers aim to infect organizations from within their development pipelines. This campaign extends the established playbook of state-sponsored actors who view developers as high-value targets for espionage and financial gain. Organizations are advised to implement strict dependency management practices and utilize security scanning tools to vet third-party code.

Share:

// SOURCES

// RELATED

Most 'AI SOCs' are just faster triage, and that's not enough

Many AI security tools only speed up alert analysis, failing to reduce analyst workload. Experts argue real gains require AI that automates response a

2 min readApr 17

ZionSiphon malware designed to sabotage water treatment systems

A new proof-of-concept malware, ZionSiphon, demonstrates how attackers can sabotage water treatment plants by manipulating industrial control systems.

2 min readApr 17

ThreatsDay bulletin: A deep dive into the Defender 0-day, SonicWall attacks, and a 17-year-old Excel flaw

This week’s threat bulletin is a heavy one. We analyze the critical Microsoft Defender 0-day, a massive SonicWall brute-force campaign, and a 17-year-

6 min readApr 17

Microsoft Defender's 'RedSun' zero-day: A researcher's protest and a threat to Windows systems

A researcher's protest exposed a critical zero-day in Microsoft Defender, allowing attackers full system control. Here's the technical breakdown and h

7 min readApr 17