Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Location-Based Gaming NFTs: How GPS and Blockchain Are Changing the Way We Play

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»North Korean Hackers Deploy 26 Malicious npm Packages
Security

North Korean Hackers Deploy 26 Malicious npm Packages

March 3, 2026No Comments3 Mins Read

A new supply-chain threat is putting developers on alert. Security researchers warn that North Korean hackers have uploaded 26 malicious packages to the npm registry. This aims to infect developer machines and steal sensitive data.

GoPlus 中文社区发推提醒,朝鲜黑客向 npm 注册表发布了一组 26 个恶意软件包,这些恶意软件包都附带一个安装脚本(install.js),该脚本会在软件包安装过程中自动执行,进而运行位于“vendor/scrypt-js/version.js”中的恶意代码,…

— 吴说区块链 (@wublockchain12) March 3, 2026

The warning, shared by the GoPlus community on March 3, links the campaign to the well-known “Famous Chollima” hacking group. According to the report, the packages hide a remote access trojan (RAT) that activates during installation. The incident shows growing risks in open-source ecosystems. Especially for Web3 and crypto developers.

Malicious Packages Hide in Plain Sight

Researchers say the attackers published 26 fake packages that mimic legitimate developer tools. Those are especially linting and utility libraries. Each package includes an install.js script that runs automatically when the package is installed. Once triggered, the script executes hidden code located in vendor/scrypt-js/version.js. This code quietly downloads a remote access trojan from a malicious URL.

Because npm installs often run automatically inside development environments. Many users may not notice the infection. Security analysts note this tactic is effective because it abuses normal developer workflows. In short, the malware arrives disguised as routine tooling.

What the Malware Can Do?

The embedded RAT gives attackers deep access to infected systems. According to the GoPlus alert, the malware can perform several dangerous actions. It can log keystrokes, steal clipboard data and collect browser credentials. It also scans systems using TruffleHog to find exposed secrets. In more serious cases, it attempts to steal Git repositories and SSH keys. For crypto developers, the risk is even higher. Stolen keys or credentials could lead directly to wallet breaches or project compromises. That is why security teams are treating this campaign as high severity.

See also  Investigators Seize $30m in Stolen Crypto from North Korea

Links to Famous Chollima Group

Investigators have tied the activity to the North Korean hacking operation known as Famous Chollima. It’s a group tracked by security firms since at least 2018. The group has a history of targeting developers, crypto projects and financial platforms.

Recent analysis suggests the campaign uses advanced obfuscation techniques. Some reports mention steganography methods that hide command and control data in seemingly harmless text. The malware infrastructure also appears distributed across multiple hosting services, making takedowns harder. This pattern fits previous North Korean operations. That focuses on long-term infiltration rather than quick attacks.

Developers Urged to Stay Alert

Security experts are urging developers to verify package sources before installing dependencies. Even small projects can become entry points for larger supply-chain breaches. GoPlus specifically warned users to avoid the flagged packages and review dependency trees carefully. Teams are also encouraged to enable lockfiles, audit tools and runtime monitoring.

The incident is another reminder that open source ecosystems remain a prime target for state linked hackers. As Web3 and crypto development grow, the stakes keep rising. For now, experts say basic hygiene, checking packages and limiting trust. It remains the best defense.

Source link

Deploy hackers Korean Malicious North npm Packages

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026
Top Posts

French regulator sees DeFi as ‘disintermediated,’ not ‘decentralized’

October 13, 2023

Tether launches open-source mining framework to unify Bitcoin infrastructure

April 28, 2026

The Protocol: Zora moves to Solana

February 18, 2026

Type above and press Enter to search. Press Esc to cancel.