A U.S. cybersecurity firm says North Korean hackers have turned one of the world’s most widely used software libraries into a delivery system for malware. In a report last week, researchers at Socket, a supply-chain security company, said they had found more than 300 malicious code packages uploaded to the npm registry, a central repository used by millions of developers to share and install JavaScript software.
The packages—small pieces of reusable code used in everything from websites to crypto applications—were designed to look harmless. But once downloaded, they installed malware capable of stealing passwords, browser data, and cryptocurrency wallet keys. Socket said the campaign, which it calls “Contagious Interview,” was part of a sophisticated operation run by North Korean state-sponsored hackers who pose as tech recruiters to target developers working in blockchain, Web3, and related industries.
Why it matters: npm is essentially the backbone of the modern web. Compromising it allows attackers to slip malicious code into countless downstream apps. Security experts have warned for years that such “software supply-chain” attacks are among the most dangerous in cyberspace because they spread invisibly through legitimate updates and dependencies.
Socket’s researchers traced the campaign through a cluster of look-alike package names—misspelled versions of popular libraries such as express, dotenv, and hardhat—and through code patterns linked to previously identified North Korean malware families known as BeaverTail and InvisibleFer
The firm said roughly 50,000 downloads of the malicious packages occurred before many were removed, though some remain online. The hackers also used fake LinkedIn recruiter accounts, a tactic consistent with previous DPRK cyber-espionage campaigns documented by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and previously reported in Decrypt. The ultimate targets, investigators believe, were machines holding access credentials and digital wallets.
While Socket’s findings line up with reports from other security groups and government agencies linking North Korea to cryptocurrency thefts totaling billions of dollars, independent verification of every detail—such as the exact number of compromised packages—remains pending. Still, the technical evidence and patterns described are consistent with prior incidents attributed to Pyongyang.
Npm’s owner, GitHub, has said it removes malicious packages when discovered and is improving account-verification requirements. But the pattern, researchers say, is whack-a-mole: take down one set of malicious packages, and hundreds more soon take their place.
- Crypto Scammers Hijack Major Australian News Broadcaster’s YouTube
- El Salvador’s Bonds Spike Despite Bitcoin Criticism
- Trump Promises to Make US ’World Capital’ of AI, Crypto at Davos
- Garmin Vivomove Sport review: the right mix of form and function and price
- Thailand Approves its First Spot Bitcoin ETF
- Dubai Police Partners With Cardano Foundation to Prevent Crime































































































































