ScarCruft (APT37) Expands Tactics with Ruby Jumper Campaign Targeting Air-Gapped Networks
Summary
Hide ▲
Show ▼
The **ScarCruft (APT37) Ruby Jumper campaign**, first discovered in **December 2025** and detailed in **February 2026**, marks a **significant expansion of tactics** to breach air-gapped networks and abuse legitimate cloud services for command-and-control (C2). The campaign deploys a **multi-stage infection chain** beginning with a malicious LNK file that drops a decoy document (e.g., an Arabic translation of a North Korean article on the Palestine-Israel conflict), an executable payload (**RESTLEAF**), a PowerShell script, and a batch file. RESTLEAF leverages **Zoho WorkDrive for C2**—the first known instance of ScarCruft using this service—to fetch shellcode, which then deploys **SNAKEDROPPER**. This implant installs a Ruby runtime, establishes persistence via a **scheduled task (`rubyupdatecheck`)** that replaces the RubyGems default file `operating_system.rb`, and drops **THUMBSBD** and **VIRUSTASK**, both designed to **weaponize removable media (USB drives)** for lateral movement into air-gapped systems. THUMBSBD supports **keylogging, audio/video surveillance, and file exfiltration**, while also creating **hidden directories on USB drives** to stage operator commands or store execution output. VIRUSTASK focuses on **initial access propagation** via USB drives, replacing legitimate files with malicious shortcuts that execute the Ruby interpreter when opened. The campaign also delivers **FOOTWINE**, a reconnaissance tool disguised as an APK file that harvests documents and monitors removable drive activity, and **BLUELIGHT**, a backdoor that adapts its C2 mode based on network connectivity (direct cloud communication or USB-based staging). This follows earlier ScarCruft operations, including **ransomware attacks (July 2025)**, **Operation HanKook Phantom (September 2025)**, and the **Contagious Interview campaign (February 2026)**, which targeted developers via malicious repositories and job-themed lures. The Ruby Jumper campaign underscores ScarCruft’s **expanded focus on air-gapped infiltration**, combining **cloud abuse with physical media exploitation** to evade network isolation and achieve persistent surveillance with minimal forensic traces. Zscaler ThreatLabz confirmed the use of **six distinct tools** in this campaign, five of which were previously undocumented.
Timeline
-
27.02.2026 14:43 3 articles · 1d ago
ScarCruft Launches Ruby Jumper Campaign with Zoho WorkDrive C2 and USB-Based Air-Gap Breaches
In **December 2025**, ScarCruft (APT37) launched the **Ruby Jumper campaign**, introducing **new tactics for breaching air-gapped networks** and abusing **Zoho WorkDrive for C2 communication**. The campaign employs a **multi-stage infection chain** starting with a malicious LNK file that drops a **decoy document** (an Arabic translation of a North Korean article on the Palestine-Israel conflict), an executable payload (**RESTLEAF**), a PowerShell script, and a batch file. The batch script triggers PowerShell, which decrypts and loads RESTLEAF in memory. RESTLEAF authenticates with Zoho WorkDrive using a valid access token to fetch shellcode, which is executed via process injection. This leads to the deployment of **SNAKEDROPPER**, which installs a **Ruby runtime environment** (Ruby 3.3.0) disguised as a USB utility (`usbspeed.exe`) and establishes persistence by replacing the RubyGems default file `operating_system.rb` with a malicious version. A scheduled task (`rubyupdatecheck`) ensures execution every five minutes. SNAKEDROPPER then drops two implants: **THUMBSBD** and **VIRUSTASK**, both Ruby-based and designed to **weaponize removable media (USB drives)**: - **THUMBSBD** creates hidden directories on USB drives to stage operator commands or store exfiltrated data, turning removable media into a **bidirectional covert C2 relay** for air-gapped systems. It supports **keylogging, audio/video capture, file manipulation, and registry modification**, and can distribute the **BLUELIGHT backdoor**. - **VIRUSTASK** acts as a lightweight backdoor that **stages exfiltrated data on USB drives** in hidden or obfuscated form for later retrieval, focusing on **propagating malware to air-gapped systems** via removable media. It replaces legitimate files with malicious shortcuts that execute the Ruby interpreter when opened, but only triggers if the media has **at least 2GB of free space**. SNAKEDROPPER also deploys **FOOTWINE**, a reconnaissance and collection utility disguised as an APK file that harvests documents and supports **keylogging, screenshot capture, audio/video recording, file manipulation, and remote shell commands**. The campaign includes **BLUELIGHT**, an encrypted payload with a shellcode launcher that enables **keylogging, audio/video surveillance, and custom TCP-based C2 communication**, adapting its mode based on network connectivity. The campaign was **discovered in December 2025** and **documented by Zscaler ThreatLabz in February 2026**, confirming the use of **six distinct tools**, five of which (**Restleaf, SnakeDropper, ThumbSBD, VirusTask, FootWine**) were previously undocumented. This represents ScarCruft’s first use of **Zoho WorkDrive for C2** and a **dedicated focus on air-gapped infiltration**, combining **cloud abuse with physical media exploitation** to evade network isolation and achieve persistent surveillance. The **decoy document** indicates targeting of individuals interested in North Korean media narratives, aligning with APT37’s historical victim profiles.
Show sources
- ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks — thehackernews.com — 27.02.2026 14:43
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
26.02.2026 12:35 1 articles · 2d ago
GitLab Bans 131 Accounts Linked to Contagious Interview Campaign
In February 2026, **GitLab banned 131 accounts** tied to the Contagious Interview campaign, citing their role in distributing **malicious code repositories** targeting developers. Analysis revealed that threat actors primarily used **consumer VPNs (80% of cases)** and **Gmail addresses (90%)** to create accounts, with intermittent use of **dedicated VPS infrastructure** and likely **laptop farms**. The actors leveraged **six legitimate services** to host malware payloads, including **Vercel (49 instances in 2025)**, **JSON Keeper**, **Mocki**, **npoint.io**, **Render**, and **Railway.app**, with Vercel remaining the most prevalent. A **private GitLab project** controlled by the group was also discovered, containing **financial and personnel records** for a North Korean IT worker cell. The records showed **earnings exceeding $1.64 million** between Q1 2022 and Q3 2025, with **detailed spreadsheets tracking quarterly income performance** for individual team members. The project highlighted the operation’s **structured enterprise model**, including **hierarchical oversight**, **defined revenue targets**, and **global facilitator networks** for money laundering and operational resiliency. GitLab’s findings corroborate broader trends in the campaign, including the use of **VS Code tasks**, **obfuscated payloads in fake font files**, and **multi-stage droppers** to evade detection. The platform’s takedown underscores the campaign’s **sustained infrastructure** and **adaptive hosting strategies**, as actors rotate between services to maintain persistence.
Show sources
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
10.11.2025 22:29 4 articles · 3mo ago
Konni Exploits Google's Find Hub for Remote Data Wiping
North Korean threat actors, including Konni APT (APT37/Kimsuky), have weaponized Google’s Find Hub service to remotely reset Android devices in South Korea, marking the first confirmed instance of a nation-state APT abusing this feature for destructive operations. The campaign, discovered in November 2025, involves a two-stage attack: initial spear-phishing (since July 2024) targeting Android devices via spoofed entities (e.g., National Tax Service), followed by secondary malware distribution through compromised KakaoTalk PC sessions. Attackers compromised the account of a psychological counselor for North Korean defectors on September 5, 2025, using it to distribute a digitally signed MSI installer ('Stress Clear.msi') disguised as a stress-relief program. The installer deployed AutoIt loaders that established persistence via scheduled tasks and C2 communication, fetching RATs like RemcosRAT, QuasarRAT, and RftRAT. Using stolen Google credentials, attackers tracked victim locations via Find Hub and triggered remote wipes when targets were away, delaying discovery and severing communication channels. The attack chain also involved prolonged internal reconnaissance, exfiltration of PII and webcam captures, and exploitation of Find Hub’s location tracking to execute remote resets. This tactic combines device sabotage, credential theft, and social engineering to erase forensic evidence and amplify the campaign’s reach through trusted contacts. The MSI installer’s setup routine deleted traces to hinder analysis, while AutoIt scripts maintained continuous C2 communication.
Show sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
25.09.2025 16:14 12 articles · 5mo ago
North Korean Threat Actors Launch Contagious Interview Campaign
The **Contagious Interview campaign**, attributed to North Korean actors including **Lazarus/BlueNoroff**, has expanded with **new tactics observed in February 2026**, where **malicious Next.js repositories** are used as lures to deliver **in-memory JavaScript malware** via **three distinct execution paths**: 1. **VS Code workspace execution**: Projects with workspace automation configuration (`runOn: "folderOpen"` in `tasks.json`) auto-execute malicious code from Vercel or GitHub gists when the developer opens and trusts the project. 2. **Build-time execution**: Modified JavaScript libraries (e.g., `jquery.min.js`) embedded in repositories activate during `npm run dev`, fetching and executing a JavaScript loader hosted on attacker-controlled infrastructure. 3. **Server startup execution**: Backend modules or route files exfiltrate process environment variables to an external server and execute JavaScript responses in memory within the Node.js server process. The payloads **profile the host**, register with a C2 server for a unique `instanceId`, and deploy a **second-stage controller** that maintains persistence, supports operator-driven discovery/exfiltration, and minimizes disk traces. Microsoft Defender flagged the activity via suspicious outbound Node.js connections, linking it to a broader cluster of threats using **job-themed lures** to blend into developer workflows. This evolution follows the **January 2026 deployment of malicious VS Code projects** and the **December 2025 EtherRAT campaign**, which exploited **React2Shell (CVE-2025-55182)**. The group continues to refine its **multi-stage infection chains**, now leveraging **alternative staging infrastructure** (GitHub gists, URL shorteners, blockchain-based NFT contracts) and **collaborating with North Korea’s fraudulent IT workers (WageMole)**. The campaign remains focused on **cryptocurrency/Web3 developers**, **global tech sectors**, and **espionage-driven financial theft**. **Additional developments** include: - A **malicious npm package (`eslint-validator`)** fetching obfuscated BeaverTail payloads from Google Drive. - A **Windows-specific infection chain** using batch scripts to download Node.js and deploy PyArmor-protected Python malware via `certutil`. - **GitLab’s ban of 131 accounts** tied to the campaign, with threat actors primarily using consumer VPNs, Gmail addresses, and legitimate services (Vercel, JSON Keeper, Mocki) to host payloads. - Discovery of a **private GitLab project** tracking a North Korean IT worker cell’s earnings ($1.64M between Q1 2022–Q3 2025), revealing structured financial oversight and hierarchical operations. - **Okta’s observation** that actors are refining interview tactics, with some scheduling hundreds of interviews to improve success rates in bypassing screening.
Show sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
10.09.2025 16:04 1 articles · 5mo ago
ZynorRAT RAT Targets Windows, Linux, and macOS Systems
A new malware family, ZynorRAT, has been discovered, targeting Windows, Linux, and macOS systems. ZynorRAT is a Go-based remote access trojan that uses a Telegram bot for command and control. The malware supports a wide range of functions, including file exfiltration, system enumeration, screenshot capture, and arbitrary command execution. The Windows version of ZynorRAT is near-identical to its Linux counterpart, indicating ongoing development. ZynorRAT is believed to be the work of a lone actor possibly of Turkish origin.
Show sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
10.09.2025 14:59 2 articles · 5mo ago
ChillyHell macOS Backdoor Resurfaces with New Version
ChillyHell is written in C++ and developed for Intel architectures. The malware is attributed to an uncategorized threat cluster dubbed UNC4487, active since at least October 2022. UNC4487 is a suspected espionage actor that has compromised Ukrainian government websites to deploy ChillyHell. The malware establishes persistence using LaunchAgent, LaunchDaemon, and modifying the user's shell profile. It uses timestomping to modify file timestamps to evade detection. ChillyHell supports commands to launch a reverse shell, download new versions, fetch additional payloads, enumerate user accounts, and conduct brute-force attacks. The malware was notarized by Apple, highlighting that not all malicious code comes unsigned.
Show sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
01.09.2025 11:26 1 articles · 6mo ago
Scarcruft (APT37) Launches Operation HanKook Phantom Targeting South Korean Academics
In September 2025, a new phishing campaign, Operation HanKook Phantom, was discovered. This campaign targets individuals associated with the National Intelligence Research Association, including academic figures, former government officials, and researchers. The campaign uses spear-phishing emails with a lure for a "National Intelligence Research Society Newsletter" containing a ZIP archive attachment with a Windows shortcut (LNK) masquerading as a PDF document. The LNK file drops RokRAT malware, which is capable of collecting system information, executing arbitrary commands, enumerating the file system, capturing screenshots, and downloading additional payloads. RokRAT exfiltrates data via Dropbox, Google Cloud, pCloud, and Yandex Cloud. The campaign also involves a PowerShell script that deploys a dropper, which then runs a next-stage payload to steal sensitive data while concealing network traffic as a Chrome file upload. The lure document used in this instance is a statement issued by Kim Yo Jong, the Deputy Director of the Publicity and Information Department of the Workers' Party of Korea, rejecting Seoul's efforts at reconciliation.
Show sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
14.08.2025 03:00 2 articles · 6mo ago
Scarcruft (APT37) Launches Ransomware Campaign Targeting South Korea
In July 2025, the North Korean threat group Scarcruft (APT37) initiated a new campaign targeting South Korea with a combination of infostealers, backdoors, and ransomware. The campaign, dubbed ChinopuNK, includes multiple malware tools designed for espionage and financial gain. The attacks start with phishing emails containing decoy documents about postal code updates. Once opened, these documents download NubSpy, a backdoor that uses the PubNub cloud service for command-and-control (C2) communication. The group also deploys ChillyChino, a PowerShell backdoor rewritten in Rust, and VCD ransomware, which encrypts specific file paths tailored to individual targets. The campaign is notable for its use of ransomware by a nation-state actor, combining espionage with financial and psychological pressure tactics.
Show sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
Information Snippets
-
Scarcruft (APT37) is a North Korean threat group known for financially motivated cyberattacks.
First reported: 14.08.2025 03:002 sources, 5 articlesShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
-
The ChinopuNK campaign began in July 2025, with some malware samples dating back to February 2025.
First reported: 14.08.2025 03:001 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
-
The campaign uses phishing emails with decoy documents about postal code updates.
First reported: 14.08.2025 03:002 sources, 2 articlesShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
The NubSpy backdoor uses the PubNub cloud service for C2 communication.
First reported: 14.08.2025 03:001 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
-
ChillyChino is a PowerShell backdoor rewritten in Rust to evade detection.
First reported: 14.08.2025 03:001 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
-
VCD ransomware encrypts specific file paths tailored to individual targets.
First reported: 14.08.2025 03:001 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
-
The campaign includes at least nine separate malware tools.
First reported: 14.08.2025 03:001 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
-
Scarcruft's use of ransomware is rare and marks a shift from its traditional espionage profile.
First reported: 14.08.2025 03:001 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
-
Scarcruft (APT37) has launched a new phishing campaign, Operation HanKook Phantom, targeting individuals associated with the National Intelligence Research Association, including academic figures, former government officials, and researchers.
First reported: 01.09.2025 11:261 source, 1 articleShow sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
The campaign uses spear-phishing emails with a lure for a "National Intelligence Research Society Newsletter" containing a ZIP archive attachment with a Windows shortcut (LNK) masquerading as a PDF document.
First reported: 01.09.2025 11:261 source, 1 articleShow sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
The LNK file drops RokRAT malware, which is capable of collecting system information, executing arbitrary commands, enumerating the file system, capturing screenshots, and downloading additional payloads.
First reported: 01.09.2025 11:261 source, 1 articleShow sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
RokRAT exfiltrates data via Dropbox, Google Cloud, pCloud, and Yandex Cloud.
First reported: 01.09.2025 11:261 source, 1 articleShow sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
The campaign also involves a PowerShell script that deploys a dropper, which then runs a next-stage payload to steal sensitive data while concealing network traffic as a Chrome file upload.
First reported: 01.09.2025 11:261 source, 1 articleShow sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
The lure document used in this instance is a statement issued by Kim Yo Jong, the Deputy Director of the Publicity and Information Department of the Workers' Party of Korea, rejecting Seoul's efforts at reconciliation.
First reported: 01.09.2025 11:261 source, 1 articleShow sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
ChillyHell is a modular backdoor malware for the macOS platform that gives attackers remote access and allows them to drop payloads or brute-force passwords.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell was first discovered in an attack against officials in Ukraine three years ago and has resurfaced with a new version.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
The new ChillyHell sample was uploaded to VirusTotal on May 2, 2025, and was notarized by Apple in 2021.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
The malware comes disguised as an executable applet packaged as applet.app but deploys as a full-fledged, persistent backdoor.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell has multiple persistence mechanisms, including using LaunchAgent, LaunchDaemon, and modifying the user's shell profile.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
Once established, ChillyHell can exfiltrate data, drop additional payloads, enumerate user accounts, and perform local password cracking.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell uses timestamping to evade detection by modifying file timestamps on infected systems.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
Apple revoked notarization of the developer certificates associated with the malware once notified by Jamf.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell is written in C++ and developed for Intel architectures.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell is attributed to an uncategorized threat cluster dubbed UNC4487, active since at least October 2022.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
UNC4487 is a suspected espionage actor that has compromised Ukrainian government websites to deploy ChillyHell.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell establishes persistence using LaunchAgent, LaunchDaemon, and modifying the user's shell profile.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell uses timestomping to modify file timestamps to evade detection.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell supports commands to launch a reverse shell, download new versions, fetch additional payloads, enumerate user accounts, and conduct brute-force attacks.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell was notarized by Apple, highlighting that not all malicious code comes unsigned.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ZynorRAT is a Go-based RAT that targets Windows and Linux systems, using a Telegram bot for command and control.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ZynorRAT supports file exfiltration, system enumeration, screenshot capture, and arbitrary command execution.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ZynorRAT's Windows version is near-identical to its Linux counterpart, indicating ongoing development.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ZynorRAT is believed to be the work of a lone actor possibly of Turkish origin.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
The North Korea-linked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented backdoor called AkdoorTea, along with tools like TsunamiKit and Tropidoor.
First reported: 25.09.2025 16:143 sources, 5 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The campaign targets software developers across all operating systems, Windows, Linux, and macOS, particularly those involved in cryptocurrency and Web3 projects.
First reported: 25.09.2025 16:145 sources, 9 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The campaign involves impersonated recruiters offering lucrative job roles over platforms like LinkedIn, Upwork, Freelancer, and Crypto Jobs List.
First reported: 25.09.2025 16:145 sources, 9 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The attacks deliver several pieces of malware such as BeaverTail, InvisibleFerret, OtterCookie, GolangGhost, and PylangGhost.
First reported: 25.09.2025 16:144 sources, 6 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
WeaselStore's functionality is similar to BeaverTail and InvisibleFerret, focusing on exfiltration of sensitive data from browsers and cryptocurrency wallets.
First reported: 25.09.2025 16:144 sources, 7 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
TsunamiKit is a malware toolkit designed for information and cryptocurrency theft, first discovered in November 2024.
First reported: 25.09.2025 16:144 sources, 6 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
TsunamiKit comprises several components, including TsunamiLoader, TsunamiInjector, TsunamiInstaller, TsunamiHardener, and TsunamiClient.
First reported: 25.09.2025 16:144 sources, 5 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
TsunamiClient incorporates a .NET spyware and drops cryptocurrency miners like XMRig and NBMiner.
First reported: 25.09.2025 16:144 sources, 6 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
Tropidoor is a sophisticated payload linked to the DeceptiveDevelopment group, sharing code with PostNapTea and LightlessCan.
First reported: 25.09.2025 16:142 sources, 4 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
AkdoorTea is a remote access trojan delivered by a Windows batch script, sharing commonalities with Akdoor and NukeSped (Manuscrypt).
First reported: 25.09.2025 16:143 sources, 4 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The DeceptiveDevelopment campaign targets developers associated with cryptocurrency and decentralized finance projects with fake job offers aimed at information theft and malware infection.
First reported: 26.09.2025 15:014 sources, 6 articlesShow sources
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The DeceptiveDevelopment campaign supplies stolen developer information to North Korea’s fraudulent IT workers, who use it to pose as job seekers and land remote work at unsuspecting companies.
First reported: 26.09.2025 15:014 sources, 6 articlesShow sources
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The DeceptiveDevelopment campaign involves tight collaboration with North Korea’s network of fraudulent IT workers, tracked as WageMole.
First reported: 26.09.2025 15:014 sources, 6 articlesShow sources
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The North Korean IT workers operate in teams, focusing on obtaining work in Western countries, particularly the US, and in Europe, targeting France, Poland, Ukraine, and Albania.
First reported: 26.09.2025 15:014 sources, 4 articlesShow sources
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
-
The North Korean IT workers impersonate real companies and engineers, producing engineering drawings with falsified approval stamps, and focus on self-education in web programming, blockchain, English, and AI integration.
First reported: 26.09.2025 15:014 sources, 5 articlesShow sources
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
-
The Contagious Interview campaign has expanded to include malicious packages in npm, PyPI, and RubyGems ecosystems.
First reported: 14.10.2025 10:093 sources, 6 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The campaign uses Discord webhooks as a command-and-control (C2) channel to exfiltrate data.
First reported: 14.10.2025 10:093 sources, 5 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The malicious packages include mysql-dumpdiscord (npm), nodejs.discord (npm), malinssx, malicus, and maliinn (PyPI), and sqlcommenter_rails (RubyGems.org).
First reported: 14.10.2025 10:093 sources, 5 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The campaign has published 338 malicious packages, downloaded over 50,000 times, using more than 180 fake personas and over a dozen C2 endpoints.
First reported: 14.10.2025 10:093 sources, 5 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The campaign targets Web3, cryptocurrency, and blockchain developers, as well as job seekers in the technical sector.
First reported: 14.10.2025 10:094 sources, 7 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The malware families delivered include HexEval, XORIndex, encrypted loaders, BeaverTail, and InvisibleFerret.
First reported: 14.10.2025 10:093 sources, 6 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The campaign involves typosquatting and lookalike libraries to deceive developers.
First reported: 14.10.2025 10:093 sources, 5 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
North Korean hackers have adopted the 'EtherHiding' technique that leverages smart contracts to host and deliver malware in social engineering campaigns that steal cryptocurrency.
First reported: 16.10.2025 17:003 sources, 5 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
A DPRK nation state threat actor, tracked internally as UNC5342, has been employing EtherHiding since February in Contagious Interview operations.
First reported: 16.10.2025 17:003 sources, 4 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
-
EtherHiding is a malware distribution technique where payloads are embedded within smart contracts on a public blockchain (Binance Smart Chain or Ethereum).
First reported: 16.10.2025 17:003 sources, 5 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The smart contract hosts the JADESNOW downloader that interacts with Ethereum to fetch the third-stage payload, which is a JavaScript version of the InvisibleFerret malware.
First reported: 16.10.2025 17:003 sources, 4 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The payload runs in memory and may ask Ethereum for an additional component that steals credentials.
First reported: 16.10.2025 17:003 sources, 5 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The hackers can use JADESNOW to retrieve a payload from either Ethereum or the BNB Smart Chain, making analysis more difficult.
First reported: 16.10.2025 17:003 sources, 5 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The transaction details show that the contract has been updated over 20 times within the first four months, with each update costing an average of $1.37 USD in gas fees.
First reported: 16.10.2025 17:003 sources, 4 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The credential stealer component targets passwords, credit cards, and cryptocurrency wallet (MetaMask and Phantom) information stored on web browsers like Chrome and Edge.
First reported: 16.10.2025 17:003 sources, 4 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The malware runs in the background and listens for incoming commands from its command and control (C2), like executing arbitrary commands and exfiltrating files in ZIP form to an external server or Telegram.
First reported: 16.10.2025 17:003 sources, 4 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The technique of EtherHiding was first described by Guardio Labs in 2023.
First reported: 17.10.2025 16:142 sources, 3 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The EtherHiding technique is resilient to conventional takedown and blocklisting efforts.
First reported: 17.10.2025 16:143 sources, 4 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The identity of an attacker using EtherHiding is difficult to trace due to the pseudonymous nature of blockchain transactions.
First reported: 17.10.2025 16:142 sources, 3 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
EtherHiding represents a shift towards next-generation bulletproof hosting where the inherent features of blockchain technology are used for malicious purposes.
First reported: 17.10.2025 16:143 sources, 4 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The Contagious Interview campaign employs a multi-stage malware infection process involving JADESNOW, BEAVERTAIL, and INVISIBLEFERRET.
First reported: 17.10.2025 16:142 sources, 3 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The Contagious Interview campaign targets developers in the cryptocurrency and technology sectors to steal sensitive data, cryptocurrency, and gain persistent access to corporate networks.
First reported: 17.10.2025 16:144 sources, 6 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
-
The Contagious Interview campaign uses elaborate social engineering tactics that mimic legitimate recruitment processes through fake recruiters and fabricated companies.
First reported: 17.10.2025 16:143 sources, 6 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
Fake recruiters lure candidates onto platforms like Telegram or Discord, then deliver malware through deceptive coding tests or fake software downloads disguised as technical assessments or interview fixes.
First reported: 17.10.2025 16:143 sources, 6 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The Contagious Interview campaign affects Windows, macOS, and Linux systems.
First reported: 17.10.2025 16:143 sources, 6 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The GhostCall and GhostHire campaigns are part of a broader operation called SnatchCrypto, attributed to the BlueNoroff subgroup of the Lazarus Group.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The GhostCall campaign targets executives at tech companies and in the venture capital sector, using fake Zoom calls to lure victims into downloading malicious payloads.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The GhostHire campaign targets Web3 developers, using fake job offers on Telegram to lure victims into executing malicious code.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The GhostCall campaign uses fake Zoom and Microsoft Teams pages to trick victims into downloading malicious software.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The GhostHire campaign uses a Telegram bot to send victims a coding assessment project that contains a malicious dependency.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The campaigns use a variety of malware families, including CosmicDoor, RooTroy, RealTimeTroy, SneakMain, and SilentSiphon.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The malware families used in these campaigns are designed to exfiltrate data from a wide range of services, including GitHub, GitLab, and various cloud services.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The GhostCall and GhostHire campaigns have been active since mid-2023, with the GhostCall campaign targeting macOS devices and the GhostHire campaign targeting both Windows and macOS systems.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
Konni (aka Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia) is a North Korea-affiliated threat actor.
First reported: 10.11.2025 22:292 sources, 2 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
-
Konni has been attributed to attacks targeting both Android and Windows devices for data theft and remote control.
First reported: 10.11.2025 22:293 sources, 3 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Konni impersonates psychological counselors and North Korean human rights activists, distributing malware disguised as stress-relief programs.
First reported: 10.11.2025 22:292 sources, 2 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
-
Konni exploits Google's Find Hub (formerly Find My Device) to remotely reset victim devices, leading to unauthorized deletion of personal data.
First reported: 10.11.2025 22:294 sources, 4 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Konni uses spear-phishing emails mimicking legitimate entities like the National Tax Service to deliver remote access trojans like Lilith RAT.
First reported: 10.11.2025 22:294 sources, 4 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Konni deploys malware that allows internal reconnaissance, monitoring, and exfiltration of Google and Naver account credentials.
First reported: 10.11.2025 22:294 sources, 4 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Konni uses a malicious Microsoft Installer (MSI) package signed with a valid Chinese company's signature to give the application an illusion of legitimacy.
First reported: 10.11.2025 22:294 sources, 4 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Konni uses an AutoIt script to launch Remcos RAT version 7.0.4, indicating active use of newer versions of the trojan.
First reported: 10.11.2025 22:294 sources, 4 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Konni has been found to use Quasar RAT and RftRAT, previously used by Kimsuky in 2023.
First reported: 10.11.2025 22:293 sources, 3 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
-
Lazarus Group has used an updated version of the Comebacker malware in attacks aimed at aerospace and defense organizations.
First reported: 10.11.2025 22:291 source, 1 articleShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
-
Kimsuky has employed a new JavaScript-based malware dropper in its recent operations.
First reported: 10.11.2025 22:291 source, 1 articleShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
-
The KONNI campaign abuses Google Find Hub to track GPS locations of targets and remotely reset Android devices to factory settings, primarily targeting South Koreans via KakaoTalk messenger.
First reported: 11.11.2025 02:462 sources, 2 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
-
The remote wipe of Android devices is timed when victims are outside to delay response and recovery, and is executed multiple times to prevent device reuse.
First reported: 11.11.2025 02:463 sources, 3 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The attack chain begins with spear-phishing messages spoofing South Korea’s National Tax Service, police, or other agencies, delivering a digitally signed MSI attachment that invokes a decoy error.vbs script and an install.bat file.
First reported: 11.11.2025 02:462 sources, 2 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
-
The BAT file triggers an AutoIT script (IoKITr.au3) that establishes persistence via a scheduled task, fetches additional modules from C2, and deploys RemcosRAT, QuasarRAT, or RftRAT for credential harvesting.
First reported: 11.11.2025 02:462 sources, 2 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
-
Compromised Google accounts are used to log into Find Hub, retrieve registered Android devices, query GPS locations, and execute remote wipe commands.
First reported: 11.11.2025 02:462 sources, 2 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
-
The attacker hijacks the victim’s KakaoTalk PC session post-wipe to distribute malicious files to the victim’s contacts, amplifying the attack’s spread.
First reported: 11.11.2025 02:463 sources, 3 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The September 5 attack targeted a South Korean counselor specializing in psychological support for North Korean defector youth, using a malicious file disguised as a 'stress relief program'.
First reported: 11.11.2025 02:463 sources, 3 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
A second attack on September 15 used the same method, confirming a pattern of targeting high-value individuals in South Korea.
First reported: 11.11.2025 02:463 sources, 3 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The Konni campaign exploited Google's Find Hub service to remotely reset Android devices, marking the first known instance of a North Korean APT abusing this feature for malicious purposes.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The attack chain involved a two-stage process: initial spear-phishing targeting Android devices (beginning July 2024) followed by secondary malware distribution via compromised KakaoTalk PC sessions.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Attackers compromised the KakaoTalk account of a psychological counselor specializing in North Korean defector support on September 5, 2025, using the account to distribute malicious files disguised as a 'stress relief program' to defectors.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The remote reset of Android devices was timed to block notifications and delay victim awareness, amplifying the attack's impact by severing communication channels.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
On September 15, 2025, a separate victim's KakaoTalk account was used to distribute similar malicious files en masse, indicating a coordinated wave of secondary infections.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The malicious files distributed included AutoIt scripts and modules enabling remote access, keylogging, and deployment of RATs such as LilithRAT and RemcosRAT.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Attackers exfiltrated large volumes of PII, sensitive data, and private content (including webcam captures) from compromised PCs, leveraging internal reconnaissance for prolonged data collection.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The KONNI APT campaign exploited Google’s Find Hub service by using a digitally signed MSI installer named 'Stress Clear.msi' to distribute AutoIt loaders disguised as stress-relief apps.
First reported: 11.11.2025 18:451 source, 1 articleShow sources
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The AutoIt loader established persistence by copying executables to the public Music folder and registering a scheduled task.
First reported: 11.11.2025 18:451 source, 1 articleShow sources
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Attackers used stolen Google account credentials to track victims’ real-time locations via Find Hub and triggered remote wipe commands only when targets were confirmed to be away.
First reported: 11.11.2025 18:451 source, 1 articleShow sources
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The MSI installer’s setup routine deleted traces to hinder forensic analysis, while AutoIt scripts disguised as error dialogs maintained continuous C2 communication.
First reported: 11.11.2025 18:451 source, 1 articleShow sources
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The campaign employed a two-stage process: spear-phishing via KakaoTalk to compromise PCs, followed by remote wipe of Android devices to sever communication channels and erase forensic evidence.
First reported: 11.11.2025 18:451 source, 1 articleShow sources
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
EtherRAT is a new Linux malware implant that exploits the React2Shell vulnerability (CVE-2025-55182) in Next.js applications to execute a multi-stage attack chain.
First reported: 09.12.2025 17:432 sources, 2 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
EtherRAT uses five distinct Linux persistence mechanisms: cron jobs, bashrc injection, XDG autostart, systemd user service, and profile injection.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
The malware leverages Ethereum smart contracts for C2 communication, querying nine public Ethereum RPC providers in parallel to prevent single-node poisoning or sinkholing.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
EtherRAT employs a self-updating mechanism by sending its source code to an API endpoint, receiving obfuscated replacement code to evade static detection.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
The attack chain begins with React2Shell exploitation to execute a base64-encoded shell command, downloading a malicious script (s.sh) that fetches a Node.js runtime and deploys an obfuscated JavaScript dropper.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
EtherRAT's encrypted loader pattern closely resembles the DPRK-affiliated BeaverTail malware used in Contagious Interview campaigns, suggesting a shared development lineage.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
The malware executes JavaScript payloads returned from C2 every 500 ms using an AsyncFunction constructor, functioning as a fully interactive Node.js shell.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
EtherRAT was recovered from a compromised Next.js application just two days after the public disclosure of CVE-2025-55182, indicating rapid weaponization by North Korean actors.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
EtherRAT queries nine public Ethereum RPC endpoints in parallel and uses a consensus mechanism to select the C2 URL returned by the majority, preventing sinkholing or poisoning by a single compromised node.
First reported: 09.12.2025 20:251 source, 1 articleShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
The EtherRAT dropper decrypts the payload with a hard-coded key and spawns it using a downloaded Node.js v20.10.0 binary, then deletes the shell script to minimize forensic traces.
First reported: 09.12.2025 20:251 source, 1 articleShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
EtherRAT enters a 500 ms polling loop with the C2 server, executing any response longer than 10 characters as JavaScript code on the infected machine.
First reported: 09.12.2025 20:251 source, 1 articleShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
Contagious Interview has shifted tactics to lure victims into cloning malicious repositories on GitHub/GitLab/Bitbucket, using VS Code's auto-run tasks.json to execute a loader script upon project opening.
First reported: 09.12.2025 20:251 source, 2 articlesShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The VS Code-based attack chain downloads a 'vscode-bootstrap.sh' script that fetches 'package.json' and 'env-setup.js', which serve as launchpads for BeaverTail and InvisibleFerret malware.
First reported: 09.12.2025 20:251 source, 3 articlesShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
OpenSourceMalware identified 13 versions of the VS Code campaign across 27 GitHub users and 11 BeaverTail variants, with repositories dating from April 22, 2025, to December 1, 2025.
First reported: 09.12.2025 20:251 source, 3 articlesShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
North Korean actors have consolidated their hosting infrastructure on Vercel, abandoning Fly.io, Platform.sh, and Render for Contagious Interview operations.
First reported: 09.12.2025 20:251 source, 2 articlesShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The Contagious Interview campaign now uses malicious VS Code projects as lures, instructing targets to clone repositories on GitHub, GitLab, or Bitbucket and open them in VS Code as part of a job assessment.
First reported: 20.01.2026 20:412 sources, 4 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The attack abuses VS Code's task configuration files (tasks.json) to execute malicious payloads hosted on Vercel domains, with the task set to run automatically upon folder opening via the 'runOn: folderOpen' option.
First reported: 20.01.2026 20:412 sources, 4 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The campaign delivers BeaverTail and InvisibleFerret malware via obfuscated JavaScript embedded in tasks.json, executed when the victim opens the project in VS Code.
First reported: 20.01.2026 20:412 sources, 4 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
Multi-stage droppers are concealed as spell-check dictionaries in task configuration files, serving as a fallback mechanism if the primary payload retrieval from Vercel fails.
First reported: 20.01.2026 20:411 source, 2 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
A new infection method delivers a backdoor offering remote code execution on compromised hosts, using a background shell command on macOS (nohup bash -c with curl) to fetch and execute JavaScript payloads via Node.js.
First reported: 20.01.2026 20:411 source, 2 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The backdoor establishes a persistent execution loop to harvest host information and communicate with a remote server, with additional JavaScript instructions executed ~8 minutes post-infection to beacon every 5 seconds and erase traces upon operator command.
First reported: 20.01.2026 20:411 source, 2 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The campaign now uses a malicious npm dependency named 'grayavatar' as a fallback method to deliver a Node.js controller capable of logging keystrokes, capturing screenshots, scanning for sensitive files, substituting cryptocurrency wallet addresses, and stealing browser credentials.
First reported: 20.01.2026 20:411 source, 2 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
A parallel Python environment is set up using a stager script to enable data collection, cryptocurrency mining (XMRig), keylogging, and AnyDesk deployment for remote access.
First reported: 20.01.2026 20:411 source, 2 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The Node.js and Python layers are referred to as BeaverTail and InvisibleFerret, respectively, with the campaign using multiple delivery methods (VS Code tasks, npm dependencies, direct JavaScript execution) to increase success rates.
First reported: 20.01.2026 20:411 source, 2 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
Attackers impersonate recruiters (e.g., CTO of 'Meta2140') on LinkedIn, sharing Notion.so links with technical assessments and malicious Bitbucket repositories to lure victims.
First reported: 20.01.2026 20:411 source, 2 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The Contagious Interview campaign now delivers a **new JavaScript-based backdoor** via malicious VS Code repositories, executed automatically when victims grant repository trust and open the project.
First reported: 22.01.2026 00:002 sources, 3 articlesShow sources
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The backdoor runs invisibly in the background on macOS using a **hidden Node.js command**, persisting even after VS Code is closed and producing no visible output to evade detection.
First reported: 22.01.2026 00:002 sources, 3 articlesShow sources
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The malicious repositories remain online for **at least two weeks** before removal, indicating a sustained window for victim exploitation.
First reported: 22.01.2026 00:002 sources, 2 articlesShow sources
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The campaign continues to refine **social engineering tactics**, focusing on developers familiar with Node.js and blockchain/cryptocurrency projects, with motives spanning **espionage, initial access brokerage, and financial gain**.
First reported: 22.01.2026 00:002 sources, 3 articlesShow sources
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
Jamf Threat Labs recommends developers **vet repositories before marking them as trusted** in VS Code and scrutinize `package.json`, install scripts, and task configuration files to avoid unintended malicious execution.
First reported: 22.01.2026 00:002 sources, 2 articlesShow sources
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The malicious Next.js repositories use two execution paths: (1) abusing `.vscode/tasks.json` to auto-execute payloads when a workspace is opened and trusted, and (2) embedding obfuscated code in development assets that fetches additional payloads when standard build commands or development servers are run.
First reported: 25.02.2026 18:422 sources, 2 articlesShow sources
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The campaign establishes a lightweight registration stage to bootstrap attacker-controlled JavaScript, which then transitions into a persistent C2 channel for delivering further payloads and exfiltrating data.
First reported: 25.02.2026 18:422 sources, 2 articlesShow sources
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
Microsoft Defender flagged the suspicious activity via outbound Node.js connections to attacker-controlled infrastructure, linking the behavior to weaponized Next.js repositories.
First reported: 25.02.2026 18:422 sources, 2 articlesShow sources
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The campaign aligns with North Korea’s broader use of job-themed lures (e.g., fake technical assessments) to blend into developer workflows, increasing the likelihood of code execution.
First reported: 25.02.2026 18:421 source, 1 articleShow sources
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
-
The malicious repositories are disguised as legitimate Next.js projects and technical assessment materials, targeting developers with high-value assets like source code, environment secrets, and cloud access credentials.
First reported: 25.02.2026 18:422 sources, 2 articlesShow sources
- Malicious Next.js Repos Target Developers Via Fake Job Interviews — www.darkreading.com — 25.02.2026 18:42
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The campaign uses three distinct execution paths to deliver in-memory JavaScript malware: (1) VS Code workspace execution via `runOn: "folderOpen"` in tasks.json, (2) build-time execution via modified JavaScript libraries (e.g., jquery.min.js) during `npm run dev`, and (3) server startup execution via backend modules or route files that exfiltrate environment variables and execute remote code.
First reported: 26.02.2026 12:351 source, 1 articleShow sources
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
The JavaScript payload profiles the host, polls a registration endpoint for a unique `instanceId`, and executes server-provided JavaScript in memory, minimizing forensic traces.
First reported: 26.02.2026 12:351 source, 1 articleShow sources
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
A second-stage controller maintains persistence, supports operator-driven discovery and exfiltration, and can terminate activity cleanly upon instruction.
First reported: 26.02.2026 12:351 source, 1 articleShow sources
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
Threat actors have shifted from Vercel URLs to alternative staging servers, including GitHub gists and URL shorteners like short.gy, to host next-stage payloads.
First reported: 26.02.2026 12:351 source, 1 articleShow sources
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
A malicious npm package named `eslint-validator` retrieves and executes an obfuscated BeaverTail payload from a Google Drive URL.
First reported: 26.02.2026 12:351 source, 1 articleShow sources
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
A Windows-specific infection chain uses a batch script to download Node.js and deploy a PyArmor-protected Python malware via certutil.
First reported: 26.02.2026 12:351 source, 1 articleShow sources
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
Some malicious VS Code projects query the Polygon blockchain to retrieve JavaScript stored within NFT contracts, using it as a resilient C2 mechanism.
First reported: 26.02.2026 12:351 source, 1 articleShow sources
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
GitLab banned 131 accounts linked to the campaign, with threat actors primarily using consumer VPNs, Gmail addresses, and legitimate services (e.g., Vercel, JSON Keeper, Mocki) to host payloads.
First reported: 26.02.2026 12:351 source, 1 articleShow sources
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
A private GitLab project revealed a North Korean IT worker cell earning over $1.64 million between Q1 2022 and Q3 2025, with structured financial tracking and hierarchical oversight.
First reported: 26.02.2026 12:351 source, 1 articleShow sources
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
Okta observed that North Korean IT workers are refining their personas and interview tactics, with some scheduling hundreds of interviews to improve success rates.
First reported: 26.02.2026 12:351 source, 1 articleShow sources
- Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware — thehackernews.com — 26.02.2026 12:35
-
ScarCruft's Ruby Jumper campaign uses a backdoor named RESTLEAF that leverages Zoho WorkDrive for C2 communication to fetch additional payloads.
First reported: 27.02.2026 14:433 sources, 3 articlesShow sources
- ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks — thehackernews.com — 27.02.2026 14:43
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
The campaign deploys SNAKEDROPPER, which installs the Ruby runtime, sets up persistence via scheduled tasks, and drops THUMBSBD and VIRUSTASK.
First reported: 27.02.2026 14:433 sources, 3 articlesShow sources
- ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks — thehackernews.com — 27.02.2026 14:43
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
THUMBSBD is a Ruby-based implant that uses removable media (e.g., USB drives) to relay commands and transfer data between internet-connected and air-gapped systems, creating hidden folders to stage operator commands or store execution output.
First reported: 27.02.2026 14:433 sources, 3 articlesShow sources
- ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks — thehackernews.com — 27.02.2026 14:43
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
THUMBSBD supports commands for system surveillance, including keylogging, audio/video capture, and file exfiltration, and can distribute the BLUELIGHT backdoor.
First reported: 27.02.2026 14:433 sources, 3 articlesShow sources
- ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks — thehackernews.com — 27.02.2026 14:43
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
VIRUSTASK is a Ruby-based implant focused exclusively on weaponizing removable media to achieve initial access on air-gapped systems.
First reported: 27.02.2026 14:433 sources, 3 articlesShow sources
- ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks — thehackernews.com — 27.02.2026 14:43
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
FOOTWINE is an encrypted payload with a shellcode launcher, featuring keylogging, audio/video surveillance, and a custom binary protocol for C2 communication over TCP.
First reported: 27.02.2026 14:433 sources, 3 articlesShow sources
- ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks — thehackernews.com — 27.02.2026 14:43
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
The campaign uses a multi-stage infection chain starting with a malicious LNK file that drops a decoy document (e.g., an article about the Palestine-Israel conflict translated into Arabic), an executable payload, a PowerShell script, and a batch file.
First reported: 27.02.2026 14:433 sources, 3 articlesShow sources
- ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks — thehackernews.com — 27.02.2026 14:43
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
The batch script launches PowerShell, which decrypts and loads RESTLEAF in memory, initiating the chain that leads to SNAKEDROPPER and subsequent implants.
First reported: 27.02.2026 14:433 sources, 3 articlesShow sources
- ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks — thehackernews.com — 27.02.2026 14:43
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
APT37 (ScarCruft) has expanded its Ruby Jumper campaign to include **FootWine**, a previously undocumented reconnaissance and collection utility focused on harvesting documents and monitoring removable drive activity for delayed data exfiltration.
First reported: 27.02.2026 16:152 sources, 2 articlesShow sources
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
The Ruby Jumper campaign's **ThumbSBD** implant abuses Windows shortcut (LNK) files on removable media to ensure automatic execution when the drive is opened on another system, facilitating lateral movement into air-gapped environments.
First reported: 27.02.2026 16:152 sources, 2 articlesShow sources
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
The **VirusTask** component in the Ruby Jumper campaign acts as a lightweight backdoor that stages exfiltrated data on USB drives in hidden or obfuscated form for later retrieval by operators.
First reported: 27.02.2026 16:152 sources, 2 articlesShow sources
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
Zscaler ThreatLabz documented the Ruby Jumper campaign in February 2026, confirming the use of **six distinct malicious tools**, five of which (Restleaf, SnakeDropper, ThumbSBD, VirusTask, FootWine) were previously undocumented.
First reported: 27.02.2026 16:152 sources, 2 articlesShow sources
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
APT37's **BlueLight backdoor** in the Ruby Jumper campaign supports dual C2 modes: direct communication with external infrastructure in connected environments, and **USB-based tasking/data staging** for air-gapped systems.
First reported: 27.02.2026 16:152 sources, 2 articlesShow sources
- North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks — www.infosecurity-magazine.com — 27.02.2026 16:15
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
The Ruby Jumper campaign's SNAKEDROPPER replaces the RubyGems default file `operating_system.rb` with a maliciously modified version that loads automatically when the Ruby interpreter starts, ensuring persistence via a scheduled task (`rubyupdatecheck`) that executes every five minutes.
First reported: 27.02.2026 21:211 source, 1 articleShow sources
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
THUMBSBD creates hidden directories on detected USB drives and copies files to them, turning removable storage devices into a bidirectional covert C2 relay for delivering commands to air-gapped systems and extracting data from them.
First reported: 27.02.2026 21:211 source, 1 articleShow sources
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
VIRUSTASK weaponizes removable drives by hiding legitimate files and replacing them with malicious shortcuts that execute the embedded Ruby interpreter when opened, but only triggers an infection process if the inserted removable media has at least 2GB of free space.
First reported: 27.02.2026 21:211 source, 1 articleShow sources
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
FOOTWINE is disguised as an Android package file (APK) and supports keylogging, screenshot capture, audio and video recording, file manipulation, registry access, and remote shell commands.
First reported: 27.02.2026 21:211 source, 1 articleShow sources
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
-
The Ruby Jumper campaign's decoy document is an Arabic translation of a North Korean newspaper article about the Palestine-Israel conflict, indicating a targeting focus on individuals interested in North Korean media narratives.
First reported: 27.02.2026 21:211 source, 1 articleShow sources
- APT37 hackers use new malware to breach air-gapped networks — www.bleepingcomputer.com — 27.02.2026 21:21
Similar Happenings
Lazarus Group Linked to Medusa Ransomware Attacks on U.S. Healthcare
North Korean state-backed hackers from the Lazarus group are targeting U.S. healthcare organizations and entities in the Middle East with Medusa ransomware in financially motivated extortion attacks. The Medusa ransomware-as-a-service (RaaS) operation has impacted over 366 organizations since its launch in 2023, with at least four additional healthcare and non-profit organizations in the U.S. targeted since November 2025. This is the first time Lazarus has been linked to Medusa ransomware, though they have been associated with other ransomware strains. The attacks use a toolset that includes both custom and commodity tools, some of which are linked to another North Korean group, Diamond Sleet. The average ransom recorded in these attacks is $260,000, which is reportedly used to fund espionage operations against defense, technology, and government sectors in the U.S., Taiwan, and South Korea. Symantec has provided indicators of compromise (IoCs) to help defenders prevent these attacks. The Stonefly sub-group of Lazarus, also known as Andariel, has been involved in ransomware operations for the past five years. Rim Jong Hyok, an alleged Stonefly member, was indicted by the US Justice Department for ransomware campaigns targeting US hospitals and healthcare providers. The US Justice Department announced a $10m reward for information related to Rim Jong Hyok.
Shift Left Security Strategy Fails to Deliver Expected Benefits
The 'shift left' security strategy, which aims to integrate security earlier in the software development lifecycle (SDLC), has failed to deliver its promised benefits. Developers are overwhelmed with cognitive load, and businesses prioritize speed over security, leading to increased risks. A study by Qualys found that 7.3% of container images from public repositories were malicious, with 70% containing cryptomining software. The strategy has shifted the burden onto developers without adequate support, resulting in security being bypassed or ignored. To address these issues, experts recommend a 'shift down' approach, where security is embedded into the infrastructure layer, managed by specialized teams. This approach automates security checks and fixes, reducing the cognitive load on developers and making secure deployment the path of least resistance.
Infostealer Malware Targets OpenClaw Configuration Files
Infostealer malware has been observed stealing OpenClaw configuration files containing API keys, authentication tokens, and other sensitive secrets. This marks the first known instance of such attacks targeting the popular AI assistant framework. The stolen data includes configuration details, authentication tokens, and persistent memory files, which could enable full compromise of the victim's digital identity. The malware, identified as a variant of the Vidar infostealer, executed a broad file-stealing routine that scanned for sensitive keywords. Researchers predict increased targeting of OpenClaw as it becomes more integrated into professional workflows. Additionally, security issues with OpenClaw have prompted the maintainers to partner with VirusTotal to scan for malicious skills uploaded to ClawHub, establish a threat model, and add the ability to audit for potential misconfigurations.
454,000+ Malicious Open Source Packages Discovered in 2026
Researchers reported a surge in malicious open source packages, with 454,648 new malicious packages discovered in 2026. These packages are increasingly used in sustained, industrialized campaigns, often state-sponsored, targeting developer machines and CI/CD pipelines. The threat landscape includes repository abuse, potentially unwanted apps, and multi-stage attacks involving host information exfiltration, droppers, and backdoors. Additionally, AI-assisted development is exacerbating the risk by recommending non-existent versions and failing to check for malicious indicators.
EU Investigates X Over Grok-Generated Sexual Content
The European Commission, along with authorities in the UK, France, California, and now Ireland, are investigating X (formerly Twitter) over the use of its Grok AI tool to generate non-consensual sexual images, including child sexual abuse material (CSAM). The investigations are examining whether X has complied with data protection laws and adequately safeguarded against the generation of harmful content. The Irish Data Protection Commission (DPC) has opened a formal inquiry into X's compliance with GDPR obligations, joining the UK's Information Commissioner's Office (ICO), the European Commission, and French prosecutors in their respective investigations. French authorities have also raided X's offices in Paris and summoned Elon Musk and X CEO Linda Yaccarino for interviews. X has restricted Grok's image generation capabilities to paid subscribers, a move criticized by UK officials.