home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,500 of 2,445   
   Mike Powell to All   
   North Korean hackers rele   
   16 Jul 25 10:18:45   
   
   TZUTC: -0500   
   MSGID: 1234.consprcy@1:2320/105 2cdcfda7   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   North Korean hackers release malware-ridden packages into npm registry   
      
   Date:   
   Tue, 15 Jul 2025 15:58:00 +0000   
      
   Description:   
   A second wave of tainted packages was spotted on npm, likely part of a larger   
   campaign.   
      
   FULL STORY   
      
   North Korean hackers have been seen pushing dozens of malicious packages to   
   npm in an attempt to compromise western technology products through supply   
   chain attacks.    
      
   Cybersecurity researchers Socket claim the latest push of 67 malicious   
   packages is just the second leg of a previous attack, in which 35 packages   
   were published, as part of a campaign called Contagious Interview.    
      
   "The Contagious Interview operation continues to follow a whack-a-mole   
   dynamic, where defenders detect and report malicious packages, and North   
   Korean threat actors quickly respond by uploading new variants using the    
   same, similar, or slightly evolved playbooks," Socket researcher Kirill   
   Boychenko said.   
      
   Thousands of victims    
      
   Uploading malicious code to npm is just a setup. The real attack most likely   
   happens elsewhere - on LinkedIn, Telegram, or Discord. North Korean attackers   
   would pose as recruiters, or HR managers in large, reputable tech companies,   
   and would reach out to software developers offering work.    
      
   The interview process includes multiple rounds of talks and concludes with a   
   test assignment. That test assignment requires the job seeker to download and   
   run an npm package, which is where the person ends up with a compromised   
   device. Obviously, that doesnt mean that other people couldnt accidentally   
   download tainted packages, as well.    
      
   Cumulatively, the packages attracted more than 17,000 downloads, which is   
   quite the attack surface.    
      
   North Koreans are infamous for their fake job and fake employee scams, whose   
   goals usually vary between cyber-espionage and financial theft. If theyre not   
   stealing intellectual property or proprietary data, then theyre stealing   
   cryptocurrencies which the government uses to fund the state apparatus and    
   its nuclear weapons program.    
      
   The campaigns deploy all sorts of malware , from the BeaverTail infostealer,   
   across XORIndex Loader, HexEval, and many others.    
      
   "Contagious Interview threat actors will continue to diversify their malware   
   portfolio, rotating through new npm maintainer aliases, reusing loaders such   
   as HexEval Loader and malware families like BeaverTail and InvisibleFerret,   
   and actively deploying newly observed variants including XORIndex Loader,"    
   the researchers concluded.    
      
    Via The Hacker News   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/north-korean-hackers-release-malware-ri   
   dden-packages-into-npm-registry   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca