CoinRSS: Bitcoin, Ethereum, Crypto News and Price Data

  • CONTACT
  • MARKETCAP
  • BLOG
CoinRSS: Bitcoin, Ethereum, Crypto News and Price Data
  • BOOKMARKS
  • Blockchain
  • Crypto
    • Bitcoin
    • Ethereum
    • Forex
    • Tether
  • Market
    • Binance
    • Business
    • Investor
    • Money
    • Trading
  • News
    • Coinbase
    • Mining
    • NFT
    • Stocks
Reading: North Korean Hackers Target Crypto Devs Through Open-Source Software Hub
Share
You have not selected any currencies to display
CoinRSS: Bitcoin, Ethereum, Crypto News and Price DataCoinRSS: Bitcoin, Ethereum, Crypto News and Price Data
0
Font ResizerAa
  • Blockchain
  • Crypto
  • Market
  • News
Search
  • Blockchain
  • Crypto
    • Bitcoin
    • Ethereum
    • Forex
    • Tether
  • Market
    • Binance
    • Business
    • Investor
    • Money
    • Trading
  • News
    • Coinbase
    • Mining
    • NFT
    • Stocks
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
CoinRSS: Bitcoin, Ethereum, Crypto News and Price Data > Blog > News > North Korean Hackers Target Crypto Devs Through Open-Source Software Hub
News

North Korean Hackers Target Crypto Devs Through Open-Source Software Hub

CoinRSS
Last updated: October 16, 2025 12:25 pm
CoinRSS Published October 16, 2025
Share

Contents
In briefGenerally Intelligent Newsletter

In brief

  • More than 300 malicious code packages were uploaded to npm in what researchers call the “Contagious Interview” campaign.
  • The fake job-recruitment lures targeted Web3 and crypto developers, stealing credentials and wallet keys.
  • Security experts warn that software supply-chain attacks are becoming a preferred tool of state actors.

A U.S. cybersecurity firm says North Korean hackers have turned one of the world’s most widely used software libraries into a delivery system for malware. In a report last week, researchers at Socket, a supply-chain security company, said they had found more than 300 malicious code packages uploaded to the npm registry, a central repository used by millions of developers to share and install JavaScript software.

The packages—small pieces of reusable code used in everything from websites to crypto applications—were designed to look harmless. But once downloaded, they installed malware capable of stealing passwords, browser data, and cryptocurrency wallet keys. Socket said the campaign, which it calls “Contagious Interview,” was part of a sophisticated operation run by North Korean state-sponsored hackers who pose as tech recruiters to target developers working in blockchain, Web3, and related industries.

Why it matters: npm is essentially the backbone of the modern web. Compromising it allows attackers to slip malicious code into countless downstream apps. Security experts have warned for years that such “software supply-chain” attacks are among the most dangerous in cyberspace because they spread invisibly through legitimate updates and dependencies.

The trail to North Korea

Socket’s researchers traced the campaign through a cluster of look-alike package names—misspelled versions of popular libraries such as express, dotenv, and hardhat—and through code patterns linked to previously identified North Korean malware families known as BeaverTail and InvisibleFerret. The attackers used encrypted “loader” scripts that decrypted and executed hidden payloads directly in memory, leaving few traces on disk.

The firm said roughly 50,000 downloads of the malicious packages occurred before many were removed, though some remain online. The hackers also used fake LinkedIn recruiter accounts, a tactic consistent with previous DPRK cyber-espionage campaigns documented by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and previously reported in Decrypt. The ultimate targets, investigators believe, were machines holding access credentials and digital wallets.

While Socket’s findings line up with reports from other security groups and government agencies linking North Korea to cryptocurrency thefts totaling billions of dollars, independent verification of every detail—such as the exact number of compromised packages—remains pending. Still, the technical evidence and patterns described are consistent with prior incidents attributed to Pyongyang.

Npm’s owner, GitHub, has said it removes malicious packages when discovered and is improving account-verification requirements. But the pattern, researchers say, is whack-a-mole: take down one set of malicious packages, and hundreds more soon take their place.

For developers and crypto startups, the episode underscores how vulnerable the software supply chain has become. Security researchers urge teams to treat every “npm install” command as potential code execution, scan dependencies before merging them into projects, and use automated vetting tools to catch tampered packages. The open-source ecosystem’s strength—its openness—remains its greatest weakness when adversaries decide to weaponize it.

Generally Intelligent Newsletter

A weekly AI journey narrated by Gen, a generative AI model.

Source link

You Might Also Like

Bitcoin: What these KEY datasets say about BTC’s market direction

Bitcoin stays above $85K: Will THIS drive BTC to $100K?

Ethena’s $0.36 resistance looms – But will a correction spoil things?

SEC Exempts Liquid Stakers Like Ethereum’s Lido, Solana’s Jito From Securities Laws

$600M Bitcoin short sparks fear – Is BTC’s $110K under threat?

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Copy Link Print
Previous Article ‘Fees this low are a good sign’ – Inside VanEck’s latest Solana ETF update
Next Article Why is crypto down today? STH panic, Bitcoin price dip, & more…
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recipe Rating




Follow US

Find US on Socials
FacebookLike
TwitterFollow
YoutubeSubscribe
TelegramFollow
Subscribe to our newslettern

Get Newest Articles Instantly!

- Advertisement -
Ad image
Popular News
Bitcoin, Ethereum and XRP Bleed as Traders Weigh End of 4-Year Cycle
What are the Most Bullish Cryptocurrencies to Buy Right Now?
Crypto Bahamas: Regulations Enter Critical Stage as Gov’t Shows Interest

Follow Us on Socials

We use social media to react to breaking news, update supporters and share information

Twitter Youtube Telegram Linkedin
CoinRSS: Bitcoin, Ethereum, Crypto News and Price Data coin-rss-logo

We influence 20 million users and is the number one business blockchain and crypto news network on the planet.

Subscribe to our newsletter

You can be the first to find out the latest news and tips about trading, markets...

Ad imageAd image
© CoinRSS: Bitcoin, Ethereum, Crypto News and Price Data. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?