North Korea target Cripto Devs via NPM package
![North Korea target Cripto Devs via NPM package 1 North Korea target Cripto Devs via NPM package](https://cryptify.ws/wp-content/uploads/2025/02/bdc275e8-33de-4e5f-9988-2003ca6f4f31.jpg)
The researchers have discovered a highly sophisticated North Korean campaign for the disguised distribution of malware crypto-theft via open source components.
SecurityCorecard said that in the blog was published this morning that it suspects that the infamous Lazarus group was called MARSTECH MAIHEM operations behind the living campaign. It has already claimed over 230 victims in the United States, Europe and Asia.
He followed the new “Marstech1” implant back to the profile “Success”, which committed malicious and original software development software since July 2024. Years.
However, securitykrakovcard claimed that the same actor also spreads malicious software through NPM packages, which are popular among the CRIPTO and Web3 project developers.
Marstech1 scans systems for Metamask, exodus and atomic banknotes, modifying the search engine configuration files to enter silent loads that can intercept transactions, said the securitykkrajkovcard said.
The risk is that developers could include it in legitimate software, installing the risk of potentially millions of their users downstream.
It is more likely than various efforts to Lazarus to avoid the static and dynamic analysis of Marstech1, including base8 and coding and cancer.
These techniques are slightly different from the previous articulation of malicious JavaScript, which were observed in two attacks at the end of 2024. And 2025. years.
This last iteration used other techniques to ensure that malicious software would go unnoticed and slid to the software supply chain, including:
- Flat control and self-efficient
- Random variable and function names
- Case64 down encoding
- Anti-Removing Errors (Verification against Unauthorized)
- Splitting and recombin
Lazarus Adapts Operations
In the sign of growing sophistication, the Lazarus Group also adapts its infrastructure to throw security researchers with scent.
The group now uses port 3000 for Command Command and Control (C2), instead of ports 1224 and 1245 and uses node.js Express, instead of stating the control panels based on which the report noted.
“The MARSTECH MAIHEM OPERATION reveals critical evolution in Lazar chain attacks, which show not only their commitment to operational concealment, but also significant adaptability in the development of implants,” said securitykrakovac for research and intelligence securityCorecard.
“Serves as a Stark Reminder that the landscape is quickly developed. It is necessary for organizations and developers to be able to monitor the advanced intelligence chain to mitigate the risk of sophisticated implant-based attacks that are In the form of sophisticated implants, they attack acts in Lazarus. “
https://assets.infosecurity-magazine.com/webpage/og/bdc275e8-33de-4e5f-9988-2003ca6f4f31.jpg
2025-02-13 13:15:00