By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT
Computing

North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

News Room
Last updated: 2026/03/02 at 4:41 AM
News Room Published 2 March 2026
Share
North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT
SHARE

Ravie LakshmananMar 02, 2026Supply Chain Attack / Malware

Cybersecurity researchers have disclosed a new iteration of the ongoing Contagious Interview campaign, where the North Korean threat actors have published a set of 26 malicious packages to the npm registry.

The packages masquerade as developer tools, but contain functionality to extract the actual command-and-control (C2) by using seemingly harmless Pastebin content as a dead drop resolver and ultimately drop a developer-targeted credential stealer and remote access trojan. The C2 infrastructure is hosted on Vercel across 31 deployments.

The campaign, tracked by Socket and kmsec.uk’s Kieran Miyamoto is being tracked under the moniker StegaBin.

“The loader extracts C2 URLs steganographically encoded within three Pastebin pastes, innocuous computer science essays in which characters at evenly-spaced positions have been replaced to spell out hidden infrastructure addresses,” Socket researchers Philipp Burckhardt and Peter van der Zee said.

The list of the malicious npm packages is as follows –

  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]

All identified packages come with an install script (“install.js”) that’s automatically executed during package installation, which, in turn, runs the malicious payload located in “vendor/scrypt-js/version.js.” Another common aspect that unites the 26 packages is that they explicitly declare the legitimate package they are typosquatting as a dependency, likely in an attempt to make them appear credible.

The payload serves as a text steganography decoder by contacting a Pastebin URL and extracting its contents to retrieve the actual C2 Vercel URLs. While the pastes seemingly contain a benign essay about computer science, the decoder is designed to look at specific characters in certain positions in the text and string them together to create a list of C2 domains.

“The decoder strips zero-width Unicode characters, reads a 5-digit length marker from the beginning, calculates evenly-spaced character positions throughout the text, and extracts the characters at those positions,” Socket said. “The extracted characters are then split on a ||| separator (with an ===END=== termination marker) to produce an array of C2 domain names.”

The malware then reaches out to the decoded domain to fetch platform-specific payloads for Windows, macOS, and Linux, a tactic widely observed in the Contagious Interview campaign. One such domain, “ext-checkdin.vercel[.]app” has been found to serve a shell script, which then contacts the same URL to retrieve a RAT component.

The Trojan connects to 103.106.67[.]63:1244 to await further instructions that allow it to change the current directory and execute shell commands, through which a comprehensive intelligence collection suite is deployed. It contains nine modules to facilitate Microsoft Visual Studio Code (VS Code) persistence, keylogging and clipboard theft, browser credential harvesting, TruffleHog secret scanning, and Git repository and SSH key exfiltration –

  • vs, which uses a malicious tasks.json file to contact a Vercel domain every time a project is opened in VS Code by taking advantage of the runOn: “folderOpen” trigger. The module specifically scans the victim’s VS Code config directory across all three platforms and writes the malicious tasks.json directly into it.
  • clip, which acts as a keylogger, mouse tracker, and clipboard stealer with support for active window tracking and conducts periodic exfiltration every 10 minutes.
  • bro, which is a Python payload to steal browser credential stores.
  • j, which is a Node.js module used for browser and cryptocurrency theft by targeting Google Chrome, Brave, Firefox, Opera, and Microsoft Edge, and extensions like MetaMask, Phantom, Coinbase Wallet, Binance, Trust, Exodus, and Keplr, among others. On macOS, it also targets the iCloud Keychain.
  • z, which enumerates the file system and steals files matching certain predefined patterns.
  • n, which acts as a RAT to grant the attacker the ability to remotely control the infected host in real-time via a persistent WebSocket connection to 103.106.67[.]63:1247 and exfiltrate data of interest over FTP.
  • truffle, which downloads the legitimate TruffleHog secrets scanner from the official GitHub page to discover and exfiltrate developer secrets.
  • git, which collects files from .ssh directories, extracts Git credentials, and scans repositories.
  • sched, which is the same as “vendor/scrypt-js/version.js” and is redeployed as a persistence mechanism.

“While previous waves of the Contagious Interview campaign relied on relatively straightforward malicious scripts and Bitbucket-hosted payloads, this latest iteration demonstrates a concerted effort to bypass both automated detection and human review,” Socket concluded.

“The use of character-level steganography on Pastebin and multi-stage Vercel routing points to an adversary that is refining its evasion techniques and attempting to make its operations more resilient.”

The disclosure comes as the North Korean actors have also been observed publishing malicious npm packages (e.g., express-core-validator) to fetch a next-stage JavaScript payload hosted on Google Drive.

“Only a single package has been published with this new technique,” Miyamoto said. “It is likely FAMOUS CHOLLIMA will continue to leverage multiple techniques and infrastructure to deliver follow-on payloads. It is unlikely this signals a complete overhaul of their stager behaviour on npm.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 8 Uses For Your Old External Hard Drives (Other Than Storage) – BGR 8 Uses For Your Old External Hard Drives (Other Than Storage) – BGR
Next Article AMD Packs an NPU Into Ryzen Desktop Processors Built for AI AMD Packs an NPU Into Ryzen Desktop Processors Built for AI
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

In the AI Era, “Skill Stacks” Beat Single Skills: Building Composable Capability | HackerNoon
In the AI Era, “Skill Stacks” Beat Single Skills: Building Composable Capability | HackerNoon
Computing
Upcoming Budget MacBook Seen Within Apple as ‘Incredible Value’
Upcoming Budget MacBook Seen Within Apple as ‘Incredible Value’
News
Retroid confirms top-spec Pocket 6 will be discontinued due to RAM price crunch
Retroid confirms top-spec Pocket 6 will be discontinued due to RAM price crunch
News
Over B Went To Boom-Era Software Companies That Haven’t Raised In 4+ Years
Over $50B Went To Boom-Era Software Companies That Haven’t Raised In 4+ Years
News

You Might also Like

In the AI Era, “Skill Stacks” Beat Single Skills: Building Composable Capability | HackerNoon
Computing

In the AI Era, “Skill Stacks” Beat Single Skills: Building Composable Capability | HackerNoon

10 Min Read
Token Marketing in 2026 Moves From Visibility to Economic Architecture | HackerNoon
Computing

Token Marketing in 2026 Moves From Visibility to Economic Architecture | HackerNoon

7 Min Read
How to Protect Your SaaS from Bot Attacks with SafeLine WAF
Computing

How to Protect Your SaaS from Bot Attacks with SafeLine WAF

11 Min Read
Armbian 26.02 Released: New Boards, Powered By Linux 6.18 LTS & RISC-V Xfce Desktop
Computing

Armbian 26.02 Released: New Boards, Powered By Linux 6.18 LTS & RISC-V Xfce Desktop

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?