🎉 Gate xStocks Trading is Now Live! Spot, Futures, and Alpha Zone – All Open!
📝 Share your trading experience or screenshots on Gate Square to unlock $1,000 rewards!
🎁 5 top Square creators * $100 Futures Voucher
🎉 Share your post on X – Top 10 posts by views * extra $50
How to Participate:
1️⃣ Follow Gate_Square
2️⃣ Make an original post (at least 20 words) with #Gate xStocks Trading Share#
3️⃣ If you share on Twitter, submit post link here: https://www.gate.com/questionnaire/6854
Note: You may submit the form multiple times. More posts, higher chances to win!
📅 July 3, 7:00 – July 9,
North Korean Npm Malware Targets Developers In Fake Job Interviews
HomeNews* Researchers uncovered 35 new malicious npm packages tied to North Korean threat actors.
Each package contains a tool called HexEval, which is a hex-encoded loader that collects information about the host computer after installation. HexEval selectively deploys another malicious program named BeaverTail, which can download and run a Python-based backdoor called InvisibleFerret. This sequence allows the Hackers to steal sensitive data and remotely control the infected system. “This nesting-doll structure helps the campaign evade basic static scanners and manual reviews,” stated Socket researcher Kirill Boychenko.
The campaign often begins when threat actors pose as recruiters on platforms like LinkedIn. They contact software engineers and send fake job assignments via links to projects hosted on GitHub or Bitbucket where these npm packages are embedded. Victims are then convinced to download and run these projects, sometimes outside of secure environments.
The Contagious Interview operation, first detailed by Palo Alto Networks Unit 42 in late 2023, seeks unauthorized access to developer machines primarily for cryptocurrency and data theft. The campaign is also known by names like CL-STA-0240, DeceptiveDevelopment, and Gwisin Gang.
Socket reports that current attacker tactics combine malware-laced open source packages, tailored social engineering, and layered delivery mechanisms to bypass security systems. The campaign shows ongoing refinement, with the addition of cross-platform keyloggers and new malware delivery techniques.
Recent activity includes the use of a social engineering strategy called ClickFix, which delivers malware such as GolangGhost and PylangGhost. This sub-campaign, ClickFake Interview, continues to target developers with customized payloads for deeper surveillance when necessary.
Previous Articles: