By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages
Computing

North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages

News Room
Last updated: 2025/06/25 at 4:30 AM
News Room Published 25 June 2025
Share
SHARE

Jun 25, 2025Ravie LakshmananMalware / Open Source

Cybersecurity researchers have uncovered a fresh batch of malicious npm packages linked to the ongoing Contagious Interview operation originating from North Korea.

According to Socket, the ongoing supply chain attack involves 35 malicious packages that were uploaded from 24 npm accounts. These packages have been collectively downloaded over 4,000 times. The complete list of the JavaScript libraries is below –

  • react-plaid-sdk
  • sumsub-node-websdk
  • vite-plugin-next-refresh
  • vite-plugin-purify
  • nextjs-insight
  • vite-plugin-svgn
  • node-loggers
  • react-logs
  • reactbootstraps
  • framer-motion-ext
  • serverlog-dispatch
  • mongo-errorlog
  • next-log-patcher
  • vite-plugin-tools
  • pixel-percent
  • test-topdev-logger-v1
  • test-topdev-logger-v3
  • server-log-engine
  • logbin-nodejs
  • vite-loader-svg
  • struct-logger
  • flexible-loggers
  • beautiful-plugins
  • chalk-config
  • jsonpacks
  • jsonspecific
  • jsonsecs
  • util-buffers
  • blur-plugins
  • proc-watch
  • node-orm-mongoose
  • prior-config
  • use-videos
  • lucide-node, and
  • router-parse

Of these, six continue to remain available for download from npm: react-plaid-sdk, sumsub-node-websdk, vite-plugin-next-refresh, vite-loader-svg, node-orm-mongoose, and router-parse.

Cybersecurity

Each of the identified npm packages contains a hex-encoded loader dubbed HexEval, which is designed to collect host information post installation and selectively deliver a follow-on payload that’s responsible for delivering a known JavaScript stealer called BeaverTail.

BeaverTail, in turn, is configured to download and execute a Python backdoor called InvisibleFerret, enabling the threat actors to collect sensitive data and establish remote control of infected hosts.

“This nesting-doll structure helps the campaign evade basic static scanners and manual reviews,” Socket researcher Kirill Boychenko said. “One npm alias also shipped a cross-platform keylogger package that captures every keystroke, showing the threat actors’ readiness to tailor payloads for deeper surveillance when the target warrants it.”

Contagious Interview, first publicly documented by Palo Alto Networks Unit 42 in late 2023, is an ongoing campaign undertaken by North Korean state-sponsored threat actors to obtain unauthorized access to developer systems with the goal of conducting cryptocurrency and data theft.

The cluster is also broadly tracked under the monikers CL-STA-0240, DeceptiveDevelopment, DEV#POPPER, Famous Chollima, Gwisin Gang, Tenacious Pungsan, UNC5342, and Void Dokkaebi.

Recent iterations of the campaign have also been observed taking advantage of the ClickFix social engineering tactic to deliver malware such as GolangGhost and PylangGhost. This sub-cluster of activity has been designated the name ClickFake Interview.

The latest findings from Socket point to a multi-pronged approach where Pyongyang threat actors are embracing various methods to trick prospective targets into installing malware under the pretext of an interview or a Zoom meeting.

The npm offshoot of Contagious Interview typically involves the attackers posing as recruiters on LinkedIn, sending job seekers and developers coding assignments by sharing a link to a malicious project hosted on GitHub or Bitbucket that embeds the npm packages within them.

“They target software engineers who are actively job-hunting, exploiting the trust that job-seekers typically place in recruiters,” Boychenko said. “Fake personas initiate contact, often with scripted outreach messages and convincing job descriptions.”

Cybersecurity

The victims are then coaxed into cloning and running these projects outside containerized environments during the purported interview process.

“This malicious campaign highlights an evolving tradecraft in North Korean supply chain attacks, one that blends malware staging, OSINT-driven targeting, and social engineering to compromise developers through trusted ecosystems,” Socket said.

“By embedding malware loaders like HexEval in open source packages and delivering them through fake job assignments, threat actors sidestep perimeter defenses and gain execution on the systems of targeted developers. The campaign’s multi-stage structure, minimal on-registry footprint, and attempt to evade containerized environments point to a well-resourced adversary refining its intrusion methods in real-time.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Google Wallet finally lets you fix your custom passes without deleting them first
Next Article Drone debris found in Ukraine indicates Russia is using new technology from Iran
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Apple’s sports app now shows tennis scores
News
‘Scary’ Android change sparks fears as Google warns AI will ‘control’ WhatsApp
News
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
Computing
Swisscom claims world first with sovereign SASE connectivity service | Computer Weekly
News

You Might also Like

Computing

nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery

5 Min Read
Computing

JD.com expands into embodied AI with focus on home applications · TechNode

1 Min Read
Computing

👨🏿‍🚀 Daily – Access Bank acquires Standard Chartered Tanzania |

2 Min Read
Computing

What to Include in a Social Media Strategy Proposal (+ Free Template) – The Gain Blog

11 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?