North Korean Hackers Use npm to Steal Credentials and Keys from Blockchain Developers

North Korean Hackers Use npm to Steal Credentials and Keys from Blockchain Developers
Table of Contents

TL;DR

  • North Korean hackers used npm to distribute more than 300 malicious packages that stole credentials and wallet keys.
  • The attackers used names similar to popular libraries and fake recruiter profiles on LinkedIn to infiltrate code into automated dependency chains.
  • Socket reports around 50,000 downloads before the packages were removed.

Researchers at Socket identified a campaign by state-backed North Korean hackers who exploited the npm registry to distribute malware targeting developers in the crypto and blockchain industries.

According to the report, more than 300 malicious packages were uploaded under the name ā€œContagious Interviewā€ and adopted names resembling well-known libraries to avoid suspicion.

The packages appeared as harmless modules, but once installed, they executed scripts that stole credentials, extracted browser data, and recovered cryptocurrency wallet keys.

Hackers

How North Korean Hackers Operated

The North Korean hackers used encrypted loaders that decrypted malicious payloads directly in memory, reducing disk traces and complicating forensic investigations. Socket estimated around 50,000 downloads before many packages were removed; however, some remain accessible.

To lure victims, the attackers used fake LinkedIn recruiter profiles and sent job offers that acted as bait. They also used misspelled names of libraries such as express, dotenv, and hardhat, allowing the packages to enter automated dependency chains without manual review.

The incident highlights the vulnerability of the software supply chain: by compromising a central repository, attackers were able to propagate malicious code to numerous dependent applications and production environments without targeting each system individually. The techniques and patterns observed by researchers match malware families previously linked to North Korea, such as BeaverTail and InvisibleFerret, providing evidence that supports this attribution.

Hackers de Corea del Norte

GitHub’s Response

GitHub, owner of npm, stated that it removes malicious packages when detected and is strengthening account verification to reduce malicious activity. Even so, experts consider the response insufficient while rapid installation practices and unvetted dependencies persist. They recommend treating every ā€œnpm installā€ command as potential code execution, auditing dependencies before merging them into repositories, and deploying automated scanning and verification tools.

The open-source ecosystem is crucial for fostering innovation, but it also presents an attack vector when sophisticated actors choose to weaponize repositories. Companies and development teams must reinforce controls, protect credentials, and implement procedures that minimize exposure.

RELATED POSTS

Ads

Follow us on Social Networks

Crypto Tutorials

Crypto Reviews