By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
Computing

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

News Room
Last updated: 2026/02/12 at 1:27 PM
News Room Published 12 February 2026
Share
Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
SHARE

Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group.

The coordinated campaign has been codenamed graphalgo in reference to the first package published in the npm registry. It’s assessed to be active since May 2025.

“Developers are approached via social platforms like LinkedIn and Facebook, or through job offerings on forums like Reddit,” ReversingLabs researcher Karlo Zanki said in a report. “The campaign includes a well-orchestrated story around a company involved in blockchain and cryptocurrency exchanges.”

Notably, one of the identified npm packages, bigmathutils, attracted more than 10,000 downloads after the first, non-malicious version was published, and before the second version containing a malicious payload was released. The names of the packages are listed below –

npm – 

  • graphalgo
  • graphorithm
  • graphstruct
  • graphlibcore
  • netstruct
  • graphnetworkx
  • terminalcolor256
  • graphkitx
  • graphchain
  • graphflux
  • graphorbit
  • graphnet
  • graphhub
  • terminal-kleur
  • graphrix
  • bignumx
  • bignumberx
  • bignumex
  • bigmathex
  • bigmathlib
  • bigmathutils
  • graphlink
  • bigmathix
  • graphflowx

PyPI –

  • graphalgo
  • graphex
  • graphlibx
  • graphdict
  • graphflux
  • graphnode
  • graphsync
  • bigpyx
  • bignum
  • bigmathex
  • bigmathix
  • bigmathutils

As with many job-focused campaigns conducted by North Korean threat actors, the attack chain begins with establishing a fake company like Veltrix Capital in the blockchain and cryptocurrency trading space, and then setting up the necessary digital real estate to create an illusion of legitimacy.

This includes registering a domain and creating a related GitHub organization to host several repositories for use in coding assessments. The repositories have been found to contain projects based on Python and JavaScript.

“Examination of these repositories didn’t reveal any obvious malicious functionality,” Zanki said. “That is because the malicious functionality was not introduced directly via the job interview repositories, but indirectly – through dependencies hosted on the npm and PyPI open-source package repositories.”

The idea behind setting up these repositories is to trick candidates who apply to its job listings on Reddit and Facebook Groups into running the projects on their machines, effectively installing the malicious dependency and triggering the infection. In some cases, victims are directly contacted by seemingly legitimate recruiters on LinkedIn.

The packages ultimately act as a conduit to deploy a remote access trojan (RAT) that periodically fetches and executes commands from an external server. It supports various commands to gather system information, enumerate files and directories, list running processes, create folders, rename files, delete files, and upload/download files.

Interestingly, the command-and-control (C2) communication is protected by a token-based mechanism to ensure that only requests with a valid token are accepted. The approach was previously observed in 2023 campaigns linked to a North Korean hacking group called Jade Sleet, which is also known as TraderTraitor or UNC4899.

It essentially works like this: the packages send system data as part of a registration step to the C2 server, which responds with a token. This token is then sent back to the C2 server in subsequent requests to establish that they are originating from an already registered infected system.

“The token-based approach is a similarity […] in both cases and has not been used by other actors in malware hosted on public package repositories as far as we know,” Zanki told The Hacker News at that time.

The findings show that North Korean state-sponsored threat actors continue to poison open-source ecosystems with malicious packages in hopes of stealing sensitive data and conducting financial theft, a fact evidenced by the RAT’s checks to determine if the MetaMask browser extension is installed in the machine.

“Evidence suggests that this is a highly sophisticated campaign,” ReversingLabs said. “Its modularity, long-lived nature, patience in building trust across different campaign elements, and the complexity of the multilayered and encrypted malware point to the work of a state-sponsored threat actor.”

More Malicious npm Packages Found

The disclosure comes as JFrog uncovered a sophisticated, malicious npm package called “duer-js” published by a user named “luizaearlyx.” While the library claims to be a utility to “make the console window more visible,” it harbors a Windows information stealer called Bada Stealer.

It’s capable of gathering Discord tokens, passwords, cookies, and autofill data from Google Chrome, Microsoft Edge, Brave, Opera, and Yandex Browser, cryptocurrency wallet details, and system information. The data is then exfiltrated to a Discord webhook, as well as the Gofile file storage service as a backup.

“In addition to stealing information from the host it infected, the malicious package downloads a secondary payload,” security researcher Guy Korolevski said. “This payload is designed to run on the Discord Desktop app startup, with self-updating capabilities, stealing directly from it, including payment methods used by the user.”

It also coincides with the discovery of another malware campaign that weaponizes npm to extort cryptocurrency payments from developers during package installation using the “npm install” command. The campaign, first recorded on February 4, 2026, has been dubbed XPACK ATTACK by OpenSourceMalware.

duer-js malicious package flow, hijacking Discord’s Electron environment

The names of the packages, all uploaded by a user named “dev.chandra_bose,” are listed below –

  • xpack-per-user
  • xpack-per-device
  • xpack-sui
  • xpack-subscription
  • xpack-arc-gateway
  • xpack-video-submission
  • test-npm-style
  • xpack-subscription-test
  • testing-package-xdsfdsfsc

“Unlike traditional malware that steals credentials or executes reverse shells, this attack innovatively abuses the HTTP 402 ‘Payment Required’ status code to create a seemingly legitimate payment wall,” security researcher Paul McCarty said. “The attack blocks installation until victims pay 0.1 USDC/ETH to the attacker’s wallet, while collecting GitHub usernames and device fingerprints.”

“If they refuse to pay, the installation simply fails after wasting 5+ minutes of their development time, and they may not even realize they’ve encountered malware versus what appeared to be a legitimate paywall for package access.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article It will take a large coalition to scale up AI adoption. The AI Impact Summit in New Delhi is the place to start building it. It will take a large coalition to scale up AI adoption. The AI Impact Summit in New Delhi is the place to start building it.
Next Article YouTube finally lands on Apple Vision Pro after long wait YouTube finally lands on Apple Vision Pro after long wait
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Learning the lessons from Ukraine’s fight against Russian cyber warfare
Learning the lessons from Ukraine’s fight against Russian cyber warfare
News
Google’s Play Store Q&A chat tool is getting smarter — here’s what’s new
Google’s Play Store Q&A chat tool is getting smarter — here’s what’s new
News
China’s NIO hires hundreds of sales staff in hope of sales boost, executive says · TechNode
China’s NIO hires hundreds of sales staff in hope of sales boost, executive says · TechNode
Computing
Astronomers discover bizarre ‘inside-out’ solar system
Astronomers discover bizarre ‘inside-out’ solar system
News

You Might also Like

China’s NIO hires hundreds of sales staff in hope of sales boost, executive says · TechNode
Computing

China’s NIO hires hundreds of sales staff in hope of sales boost, executive says · TechNode

1 Min Read
Renault and Geely collaborate to make electric SUV for overseas markets: report · TechNode
Computing

Renault and Geely collaborate to make electric SUV for overseas markets: report · TechNode

1 Min Read
Can CreateAI make a high-quality wuxia game Heroes of Jin Yong? · TechNode
Computing

Can CreateAI make a high-quality wuxia game Heroes of Jin Yong? · TechNode

4 Min Read
Visionox tops out world’s first FMM-free 8.6-gen AMOLED line with .7 billion investment · TechNode
Computing

Visionox tops out world’s first FMM-free 8.6-gen AMOLED line with $7.7 billion investment · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?