Scarcruft (APT37) Ransomware Campaign Targets South Korea
Summary
Hide ▲
Show ▼
North Korean threat actors have **expanded the Contagious Interview campaign** with a **new JavaScript-based backdoor** delivered via **malicious VS Code repositories**, marking the latest evolution in their multi-stage infection chain. When victims clone and open these repositories—framed as technical assignments or code reviews—they are prompted to trust the repository author. Upon granting trust, VS Code automatically executes a hidden **Node.js command** in the background, deploying the backdoor with **remote code execution capabilities**. The payload persists even after VS Code is closed, produces no visible output, and remains undetected while exfiltrating credentials and sensitive data. This tactic builds on earlier methods, such as **abusing `tasks.json` files** and **malicious npm dependencies (e.g., 'grayavatar')**, but introduces a **fully JavaScript-based payload** tailored for developers familiar with Node.js. The campaign, active since late 2023, continues to target **software developers, particularly in blockchain, cryptocurrency, and Web3 sectors**, blending **social engineering with technical deception**. Previous milestones include the **December 2025 deployment of EtherRAT**, which exploited **React2Shell (CVE-2025-55182)** and **Ethereum smart contracts for C2**, and the **January 2026 wave** using **BeaverTail and InvisibleFerret malware** via GitHub/GitLab/Bitbucket lures. The group collaborates with **North Korea’s fraudulent IT workers (WageMole)** to amplify credential theft and financial fraud, while consolidating hosting on **Vercel domains** and refining **AI-generated artifacts** to evade detection. The latest backdoor underscores the campaign’s **rapid adaptation**, combining **espionage-driven data theft** with **financial motives** through persistent, multi-layered infections.
Timeline
-
10.11.2025 22:29 4 articles · 2mo ago
Konni Exploits Google's Find Hub for Remote Data Wiping
North Korean threat actors, including Konni APT (APT37/Kimsuky), have weaponized Google’s Find Hub service to remotely reset Android devices in South Korea, marking the first confirmed instance of a nation-state APT abusing this feature for destructive operations. The campaign, discovered in November 2025, involves a two-stage attack: initial spear-phishing (since July 2024) targeting Android devices via spoofed entities (e.g., National Tax Service), followed by secondary malware distribution through compromised KakaoTalk PC sessions. Attackers compromised the account of a psychological counselor for North Korean defectors on September 5, 2025, using it to distribute a digitally signed MSI installer ('Stress Clear.msi') disguised as a stress-relief program. The installer deployed AutoIt loaders that established persistence via scheduled tasks and C2 communication, fetching RATs like RemcosRAT, QuasarRAT, and RftRAT. Using stolen Google credentials, attackers tracked victim locations via Find Hub and triggered remote wipes when targets were away, delaying discovery and severing communication channels. The attack chain also involved prolonged internal reconnaissance, exfiltration of PII and webcam captures, and exploitation of Find Hub’s location tracking to execute remote resets. This tactic combines device sabotage, credential theft, and social engineering to erase forensic evidence and amplify the campaign’s reach through trusted contacts. The MSI installer’s setup routine deleted traces to hinder analysis, while AutoIt scripts maintained continuous C2 communication.
Show sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
25.09.2025 16:14 10 articles · 3mo ago
North Korean Threat Actors Launch Contagious Interview Campaign
The **Contagious Interview campaign**, attributed to North Korean actors including **Lazarus/BlueNoroff**, has expanded with **new tactics observed in January 2026**, where malicious **VS Code projects** are used as lures to deliver **BeaverTail, InvisibleFerret, and a newly identified JavaScript-based backdoor**. Victims are instructed to clone repositories on GitHub, GitLab, or Bitbucket as part of fake job assessments, triggering automatic execution of obfuscated payloads via abused `tasks.json` files (configured with `runOn: folderOpen`) or **hidden Node.js commands** when repository trust is granted. The payloads, hosted on **Vercel domains**, deploy backdoors with **remote code execution (RCE) capabilities**, establish persistent C2 communication, and use **fallback mechanisms** such as malicious npm dependencies (e.g., 'grayavatar') or spell-check dictionary decoys. The **Node.js-based BeaverTail** component handles keystroke logging, screenshot capture, credential theft from browsers, and clipboard substitution of cryptocurrency wallet addresses. A parallel **Python environment (InvisibleFerret)** enables data exfiltration, XMRig cryptocurrency mining, and AnyDesk deployment for remote access. The **new JavaScript backdoor**, discovered in January 2026, runs invisibly in the background on macOS, persists after VS Code closure, and produces no visible output to evade detection. The campaign leverages **LinkedIn impersonation** (e.g., posing as the CTO of 'Meta2140') to distribute Notion.so links with technical assessments and malicious repositories. This evolution follows the **December 2025 deployment of EtherRAT**, which exploited **React2Shell (CVE-2025-55182)** to target Linux systems with **Ethereum smart contract-based C2** and **five persistence mechanisms**. The group continues to refine its **multi-stage infection chains**, consolidating hosting on **Vercel**, using **AI-generated script artifacts**, and collaborating with **North Korea’s fraudulent IT workers (WageMole)** to amplify credential theft and financial fraud. The campaign remains focused on **cryptocurrency/Web3 developers**, **global tech sectors**, and **espionage-driven financial theft**.
Show sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
10.09.2025 16:04 1 articles · 4mo ago
ZynorRAT RAT Targets Windows, Linux, and macOS Systems
A new malware family, ZynorRAT, has been discovered, targeting Windows, Linux, and macOS systems. ZynorRAT is a Go-based remote access trojan that uses a Telegram bot for command and control. The malware supports a wide range of functions, including file exfiltration, system enumeration, screenshot capture, and arbitrary command execution. The Windows version of ZynorRAT is near-identical to its Linux counterpart, indicating ongoing development. ZynorRAT is believed to be the work of a lone actor possibly of Turkish origin.
Show sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
10.09.2025 14:59 2 articles · 4mo ago
ChillyHell macOS Backdoor Resurfaces with New Version
ChillyHell is written in C++ and developed for Intel architectures. The malware is attributed to an uncategorized threat cluster dubbed UNC4487, active since at least October 2022. UNC4487 is a suspected espionage actor that has compromised Ukrainian government websites to deploy ChillyHell. The malware establishes persistence using LaunchAgent, LaunchDaemon, and modifying the user's shell profile. It uses timestomping to modify file timestamps to evade detection. ChillyHell supports commands to launch a reverse shell, download new versions, fetch additional payloads, enumerate user accounts, and conduct brute-force attacks. The malware was notarized by Apple, highlighting that not all malicious code comes unsigned.
Show sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
01.09.2025 11:26 1 articles · 4mo ago
Scarcruft (APT37) Launches Operation HanKook Phantom Targeting South Korean Academics
In September 2025, a new phishing campaign, Operation HanKook Phantom, was discovered. This campaign targets individuals associated with the National Intelligence Research Association, including academic figures, former government officials, and researchers. The campaign uses spear-phishing emails with a lure for a "National Intelligence Research Society Newsletter" containing a ZIP archive attachment with a Windows shortcut (LNK) masquerading as a PDF document. The LNK file drops RokRAT malware, which is capable of collecting system information, executing arbitrary commands, enumerating the file system, capturing screenshots, and downloading additional payloads. RokRAT exfiltrates data via Dropbox, Google Cloud, pCloud, and Yandex Cloud. The campaign also involves a PowerShell script that deploys a dropper, which then runs a next-stage payload to steal sensitive data while concealing network traffic as a Chrome file upload. The lure document used in this instance is a statement issued by Kim Yo Jong, the Deputy Director of the Publicity and Information Department of the Workers' Party of Korea, rejecting Seoul's efforts at reconciliation.
Show sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
14.08.2025 03:00 2 articles · 5mo ago
Scarcruft (APT37) Launches Ransomware Campaign Targeting South Korea
In July 2025, the North Korean threat group Scarcruft (APT37) initiated a new campaign targeting South Korea with a combination of infostealers, backdoors, and ransomware. The campaign, dubbed ChinopuNK, includes multiple malware tools designed for espionage and financial gain. The attacks start with phishing emails containing decoy documents about postal code updates. Once opened, these documents download NubSpy, a backdoor that uses the PubNub cloud service for command-and-control (C2) communication. The group also deploys ChillyChino, a PowerShell backdoor rewritten in Rust, and VCD ransomware, which encrypts specific file paths tailored to individual targets. The campaign is notable for its use of ransomware by a nation-state actor, combining espionage with financial and psychological pressure tactics.
Show sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
Information Snippets
-
Scarcruft (APT37) is a North Korean threat group known for financially motivated cyberattacks.
First reported: 14.08.2025 03:002 sources, 5 articlesShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
-
The ChinopuNK campaign began in July 2025, with some malware samples dating back to February 2025.
First reported: 14.08.2025 03:001 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
-
The campaign uses phishing emails with decoy documents about postal code updates.
First reported: 14.08.2025 03:002 sources, 2 articlesShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
The NubSpy backdoor uses the PubNub cloud service for C2 communication.
First reported: 14.08.2025 03:001 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
-
ChillyChino is a PowerShell backdoor rewritten in Rust to evade detection.
First reported: 14.08.2025 03:001 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
-
VCD ransomware encrypts specific file paths tailored to individual targets.
First reported: 14.08.2025 03:001 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
-
The campaign includes at least nine separate malware tools.
First reported: 14.08.2025 03:001 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
-
Scarcruft's use of ransomware is rare and marks a shift from its traditional espionage profile.
First reported: 14.08.2025 03:001 source, 1 articleShow sources
- North Korea Attacks South Koreans With Ransomware — www.darkreading.com — 14.08.2025 03:00
-
Scarcruft (APT37) has launched a new phishing campaign, Operation HanKook Phantom, targeting individuals associated with the National Intelligence Research Association, including academic figures, former government officials, and researchers.
First reported: 01.09.2025 11:261 source, 1 articleShow sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
The campaign uses spear-phishing emails with a lure for a "National Intelligence Research Society Newsletter" containing a ZIP archive attachment with a Windows shortcut (LNK) masquerading as a PDF document.
First reported: 01.09.2025 11:261 source, 1 articleShow sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
The LNK file drops RokRAT malware, which is capable of collecting system information, executing arbitrary commands, enumerating the file system, capturing screenshots, and downloading additional payloads.
First reported: 01.09.2025 11:261 source, 1 articleShow sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
RokRAT exfiltrates data via Dropbox, Google Cloud, pCloud, and Yandex Cloud.
First reported: 01.09.2025 11:261 source, 1 articleShow sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
The campaign also involves a PowerShell script that deploys a dropper, which then runs a next-stage payload to steal sensitive data while concealing network traffic as a Chrome file upload.
First reported: 01.09.2025 11:261 source, 1 articleShow sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
The lure document used in this instance is a statement issued by Kim Yo Jong, the Deputy Director of the Publicity and Information Department of the Workers' Party of Korea, rejecting Seoul's efforts at reconciliation.
First reported: 01.09.2025 11:261 source, 1 articleShow sources
- ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics — thehackernews.com — 01.09.2025 11:26
-
ChillyHell is a modular backdoor malware for the macOS platform that gives attackers remote access and allows them to drop payloads or brute-force passwords.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell was first discovered in an attack against officials in Ukraine three years ago and has resurfaced with a new version.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
The new ChillyHell sample was uploaded to VirusTotal on May 2, 2025, and was notarized by Apple in 2021.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
The malware comes disguised as an executable applet packaged as applet.app but deploys as a full-fledged, persistent backdoor.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell has multiple persistence mechanisms, including using LaunchAgent, LaunchDaemon, and modifying the user's shell profile.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
Once established, ChillyHell can exfiltrate data, drop additional payloads, enumerate user accounts, and perform local password cracking.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell uses timestamping to evade detection by modifying file timestamps on infected systems.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
Apple revoked notarization of the developer certificates associated with the malware once notified by Jamf.
First reported: 10.09.2025 14:592 sources, 2 articlesShow sources
- Dormant macOS Backdoor ChillyHell Resurfaces — www.darkreading.com — 10.09.2025 14:59
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell is written in C++ and developed for Intel architectures.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell is attributed to an uncategorized threat cluster dubbed UNC4487, active since at least October 2022.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
UNC4487 is a suspected espionage actor that has compromised Ukrainian government websites to deploy ChillyHell.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell establishes persistence using LaunchAgent, LaunchDaemon, and modifying the user's shell profile.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell uses timestomping to modify file timestamps to evade detection.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell supports commands to launch a reverse shell, download new versions, fetch additional payloads, enumerate user accounts, and conduct brute-force attacks.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ChillyHell was notarized by Apple, highlighting that not all malicious code comes unsigned.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ZynorRAT is a Go-based RAT that targets Windows and Linux systems, using a Telegram bot for command and control.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ZynorRAT supports file exfiltration, system enumeration, screenshot capture, and arbitrary command execution.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ZynorRAT's Windows version is near-identical to its Linux counterpart, indicating ongoing development.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
ZynorRAT is believed to be the work of a lone actor possibly of Turkish origin.
First reported: 10.09.2025 16:041 source, 1 articleShow sources
- CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems — thehackernews.com — 10.09.2025 16:04
-
The North Korea-linked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented backdoor called AkdoorTea, along with tools like TsunamiKit and Tropidoor.
First reported: 25.09.2025 16:143 sources, 5 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The campaign targets software developers across all operating systems, Windows, Linux, and macOS, particularly those involved in cryptocurrency and Web3 projects.
First reported: 25.09.2025 16:144 sources, 7 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The campaign involves impersonated recruiters offering lucrative job roles over platforms like LinkedIn, Upwork, Freelancer, and Crypto Jobs List.
First reported: 25.09.2025 16:144 sources, 7 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The attacks deliver several pieces of malware such as BeaverTail, InvisibleFerret, OtterCookie, GolangGhost, and PylangGhost.
First reported: 25.09.2025 16:144 sources, 6 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
WeaselStore's functionality is similar to BeaverTail and InvisibleFerret, focusing on exfiltration of sensitive data from browsers and cryptocurrency wallets.
First reported: 25.09.2025 16:144 sources, 7 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
TsunamiKit is a malware toolkit designed for information and cryptocurrency theft, first discovered in November 2024.
First reported: 25.09.2025 16:144 sources, 6 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
TsunamiKit comprises several components, including TsunamiLoader, TsunamiInjector, TsunamiInstaller, TsunamiHardener, and TsunamiClient.
First reported: 25.09.2025 16:144 sources, 5 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
TsunamiClient incorporates a .NET spyware and drops cryptocurrency miners like XMRig and NBMiner.
First reported: 25.09.2025 16:144 sources, 6 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
Tropidoor is a sophisticated payload linked to the DeceptiveDevelopment group, sharing code with PostNapTea and LightlessCan.
First reported: 25.09.2025 16:142 sources, 4 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
AkdoorTea is a remote access trojan delivered by a Windows batch script, sharing commonalities with Akdoor and NukeSped (Manuscrypt).
First reported: 25.09.2025 16:143 sources, 4 articlesShow sources
- North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers — thehackernews.com — 25.09.2025 16:14
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The DeceptiveDevelopment campaign targets developers associated with cryptocurrency and decentralized finance projects with fake job offers aimed at information theft and malware infection.
First reported: 26.09.2025 15:013 sources, 4 articlesShow sources
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The DeceptiveDevelopment campaign supplies stolen developer information to North Korea’s fraudulent IT workers, who use it to pose as job seekers and land remote work at unsuspecting companies.
First reported: 26.09.2025 15:013 sources, 4 articlesShow sources
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The DeceptiveDevelopment campaign involves tight collaboration with North Korea’s network of fraudulent IT workers, tracked as WageMole.
First reported: 26.09.2025 15:013 sources, 4 articlesShow sources
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The North Korean IT workers operate in teams, focusing on obtaining work in Western countries, particularly the US, and in Europe, targeting France, Poland, Ukraine, and Albania.
First reported: 26.09.2025 15:013 sources, 3 articlesShow sources
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
-
The North Korean IT workers impersonate real companies and engineers, producing engineering drawings with falsified approval stamps, and focus on self-education in web programming, blockchain, English, and AI integration.
First reported: 26.09.2025 15:013 sources, 4 articlesShow sources
- North Korea’s Fake Recruiters Feed Stolen Data to IT Workers — www.securityweek.com — 26.09.2025 15:01
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The Contagious Interview campaign has expanded to include malicious packages in npm, PyPI, and RubyGems ecosystems.
First reported: 14.10.2025 10:093 sources, 5 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The campaign uses Discord webhooks as a command-and-control (C2) channel to exfiltrate data.
First reported: 14.10.2025 10:093 sources, 5 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The malicious packages include mysql-dumpdiscord (npm), nodejs.discord (npm), malinssx, malicus, and maliinn (PyPI), and sqlcommenter_rails (RubyGems.org).
First reported: 14.10.2025 10:093 sources, 5 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The campaign has published 338 malicious packages, downloaded over 50,000 times, using more than 180 fake personas and over a dozen C2 endpoints.
First reported: 14.10.2025 10:093 sources, 5 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The campaign targets Web3, cryptocurrency, and blockchain developers, as well as job seekers in the technical sector.
First reported: 14.10.2025 10:094 sources, 6 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
The malware families delivered include HexEval, XORIndex, encrypted loaders, BeaverTail, and InvisibleFerret.
First reported: 14.10.2025 10:093 sources, 5 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The campaign involves typosquatting and lookalike libraries to deceive developers.
First reported: 14.10.2025 10:093 sources, 5 articlesShow sources
- npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels — thehackernews.com — 14.10.2025 10:09
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
North Korean hackers have adopted the 'EtherHiding' technique that leverages smart contracts to host and deliver malware in social engineering campaigns that steal cryptocurrency.
First reported: 16.10.2025 17:003 sources, 5 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
A DPRK nation state threat actor, tracked internally as UNC5342, has been employing EtherHiding since February in Contagious Interview operations.
First reported: 16.10.2025 17:003 sources, 4 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
-
EtherHiding is a malware distribution technique where payloads are embedded within smart contracts on a public blockchain (Binance Smart Chain or Ethereum).
First reported: 16.10.2025 17:003 sources, 5 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The smart contract hosts the JADESNOW downloader that interacts with Ethereum to fetch the third-stage payload, which is a JavaScript version of the InvisibleFerret malware.
First reported: 16.10.2025 17:003 sources, 4 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The payload runs in memory and may ask Ethereum for an additional component that steals credentials.
First reported: 16.10.2025 17:003 sources, 5 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The hackers can use JADESNOW to retrieve a payload from either Ethereum or the BNB Smart Chain, making analysis more difficult.
First reported: 16.10.2025 17:003 sources, 5 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The transaction details show that the contract has been updated over 20 times within the first four months, with each update costing an average of $1.37 USD in gas fees.
First reported: 16.10.2025 17:003 sources, 4 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The credential stealer component targets passwords, credit cards, and cryptocurrency wallet (MetaMask and Phantom) information stored on web browsers like Chrome and Edge.
First reported: 16.10.2025 17:003 sources, 4 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The malware runs in the background and listens for incoming commands from its command and control (C2), like executing arbitrary commands and exfiltrating files in ZIP form to an external server or Telegram.
First reported: 16.10.2025 17:003 sources, 4 articlesShow sources
- North Korean hackers use EtherHiding to hide malware on the blockchain — www.bleepingcomputer.com — 16.10.2025 17:00
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The technique of EtherHiding was first described by Guardio Labs in 2023.
First reported: 17.10.2025 16:142 sources, 3 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The EtherHiding technique is resilient to conventional takedown and blocklisting efforts.
First reported: 17.10.2025 16:143 sources, 4 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The identity of an attacker using EtherHiding is difficult to trace due to the pseudonymous nature of blockchain transactions.
First reported: 17.10.2025 16:142 sources, 3 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
EtherHiding represents a shift towards next-generation bulletproof hosting where the inherent features of blockchain technology are used for malicious purposes.
First reported: 17.10.2025 16:143 sources, 4 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The Contagious Interview campaign employs a multi-stage malware infection process involving JADESNOW, BEAVERTAIL, and INVISIBLEFERRET.
First reported: 17.10.2025 16:142 sources, 3 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The Contagious Interview campaign targets developers in the cryptocurrency and technology sectors to steal sensitive data, cryptocurrency, and gain persistent access to corporate networks.
First reported: 17.10.2025 16:144 sources, 5 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
The Contagious Interview campaign uses elaborate social engineering tactics that mimic legitimate recruitment processes through fake recruiters and fabricated companies.
First reported: 17.10.2025 16:143 sources, 4 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
Fake recruiters lure candidates onto platforms like Telegram or Discord, then deliver malware through deceptive coding tests or fake software downloads disguised as technical assessments or interview fixes.
First reported: 17.10.2025 16:143 sources, 4 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
The Contagious Interview campaign affects Windows, macOS, and Linux systems.
First reported: 17.10.2025 16:143 sources, 4 articlesShow sources
- North Korean Hackers Use EtherHiding to Steal Crypto — www.infosecurity-magazine.com — 17.10.2025 16:14
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
The GhostCall and GhostHire campaigns are part of a broader operation called SnatchCrypto, attributed to the BlueNoroff subgroup of the Lazarus Group.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The GhostCall campaign targets executives at tech companies and in the venture capital sector, using fake Zoom calls to lure victims into downloading malicious payloads.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The GhostHire campaign targets Web3 developers, using fake job offers on Telegram to lure victims into executing malicious code.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The GhostCall campaign uses fake Zoom and Microsoft Teams pages to trick victims into downloading malicious software.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The GhostHire campaign uses a Telegram bot to send victims a coding assessment project that contains a malicious dependency.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The campaigns use a variety of malware families, including CosmicDoor, RooTroy, RealTimeTroy, SneakMain, and SilentSiphon.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The malware families used in these campaigns are designed to exfiltrate data from a wide range of services, including GitHub, GitLab, and various cloud services.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
The GhostCall and GhostHire campaigns have been active since mid-2023, with the GhostCall campaign targeting macOS devices and the GhostHire campaign targeting both Windows and macOS systems.
First reported: 28.10.2025 18:121 source, 1 articleShow sources
- Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains — thehackernews.com — 28.10.2025 18:12
-
Konni (aka Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia) is a North Korea-affiliated threat actor.
First reported: 10.11.2025 22:292 sources, 2 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
-
Konni has been attributed to attacks targeting both Android and Windows devices for data theft and remote control.
First reported: 10.11.2025 22:293 sources, 3 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Konni impersonates psychological counselors and North Korean human rights activists, distributing malware disguised as stress-relief programs.
First reported: 10.11.2025 22:292 sources, 2 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
-
Konni exploits Google's Find Hub (formerly Find My Device) to remotely reset victim devices, leading to unauthorized deletion of personal data.
First reported: 10.11.2025 22:294 sources, 4 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Konni uses spear-phishing emails mimicking legitimate entities like the National Tax Service to deliver remote access trojans like Lilith RAT.
First reported: 10.11.2025 22:294 sources, 4 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Konni deploys malware that allows internal reconnaissance, monitoring, and exfiltration of Google and Naver account credentials.
First reported: 10.11.2025 22:294 sources, 4 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Konni uses a malicious Microsoft Installer (MSI) package signed with a valid Chinese company's signature to give the application an illusion of legitimacy.
First reported: 10.11.2025 22:294 sources, 4 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Konni uses an AutoIt script to launch Remcos RAT version 7.0.4, indicating active use of newer versions of the trojan.
First reported: 10.11.2025 22:294 sources, 4 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Konni has been found to use Quasar RAT and RftRAT, previously used by Kimsuky in 2023.
First reported: 10.11.2025 22:293 sources, 3 articlesShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
-
Lazarus Group has used an updated version of the Comebacker malware in attacks aimed at aerospace and defense organizations.
First reported: 10.11.2025 22:291 source, 1 articleShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
-
Kimsuky has employed a new JavaScript-based malware dropper in its recent operations.
First reported: 10.11.2025 22:291 source, 1 articleShow sources
- Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon — thehackernews.com — 10.11.2025 22:29
-
The KONNI campaign abuses Google Find Hub to track GPS locations of targets and remotely reset Android devices to factory settings, primarily targeting South Koreans via KakaoTalk messenger.
First reported: 11.11.2025 02:462 sources, 2 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
-
The remote wipe of Android devices is timed when victims are outside to delay response and recovery, and is executed multiple times to prevent device reuse.
First reported: 11.11.2025 02:463 sources, 3 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The attack chain begins with spear-phishing messages spoofing South Korea’s National Tax Service, police, or other agencies, delivering a digitally signed MSI attachment that invokes a decoy error.vbs script and an install.bat file.
First reported: 11.11.2025 02:462 sources, 2 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
-
The BAT file triggers an AutoIT script (IoKITr.au3) that establishes persistence via a scheduled task, fetches additional modules from C2, and deploys RemcosRAT, QuasarRAT, or RftRAT for credential harvesting.
First reported: 11.11.2025 02:462 sources, 2 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
-
Compromised Google accounts are used to log into Find Hub, retrieve registered Android devices, query GPS locations, and execute remote wipe commands.
First reported: 11.11.2025 02:462 sources, 2 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
-
The attacker hijacks the victim’s KakaoTalk PC session post-wipe to distribute malicious files to the victim’s contacts, amplifying the attack’s spread.
First reported: 11.11.2025 02:463 sources, 3 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The September 5 attack targeted a South Korean counselor specializing in psychological support for North Korean defector youth, using a malicious file disguised as a 'stress relief program'.
First reported: 11.11.2025 02:463 sources, 3 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
A second attack on September 15 used the same method, confirming a pattern of targeting high-value individuals in South Korea.
First reported: 11.11.2025 02:463 sources, 3 articlesShow sources
- APT37 hackers abuse Google Find Hub in Android data-wiping attacks — www.bleepingcomputer.com — 11.11.2025 02:46
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The Konni campaign exploited Google's Find Hub service to remotely reset Android devices, marking the first known instance of a North Korean APT abusing this feature for malicious purposes.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The attack chain involved a two-stage process: initial spear-phishing targeting Android devices (beginning July 2024) followed by secondary malware distribution via compromised KakaoTalk PC sessions.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Attackers compromised the KakaoTalk account of a psychological counselor specializing in North Korean defector support on September 5, 2025, using the account to distribute malicious files disguised as a 'stress relief program' to defectors.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The remote reset of Android devices was timed to block notifications and delay victim awareness, amplifying the attack's impact by severing communication channels.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
On September 15, 2025, a separate victim's KakaoTalk account was used to distribute similar malicious files en masse, indicating a coordinated wave of secondary infections.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The malicious files distributed included AutoIt scripts and modules enabling remote access, keylogging, and deployment of RATs such as LilithRAT and RemcosRAT.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Attackers exfiltrated large volumes of PII, sensitive data, and private content (including webcam captures) from compromised PCs, leveraging internal reconnaissance for prolonged data collection.
First reported: 11.11.2025 13:402 sources, 2 articlesShow sources
- Kimsuky APT Takes Over South Korean Androids, Abuses KakaoTalk — www.darkreading.com — 11.11.2025 13:40
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The KONNI APT campaign exploited Google’s Find Hub service by using a digitally signed MSI installer named 'Stress Clear.msi' to distribute AutoIt loaders disguised as stress-relief apps.
First reported: 11.11.2025 18:451 source, 1 articleShow sources
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The AutoIt loader established persistence by copying executables to the public Music folder and registering a scheduled task.
First reported: 11.11.2025 18:451 source, 1 articleShow sources
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
Attackers used stolen Google account credentials to track victims’ real-time locations via Find Hub and triggered remote wipe commands only when targets were confirmed to be away.
First reported: 11.11.2025 18:451 source, 1 articleShow sources
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The MSI installer’s setup routine deleted traces to hinder forensic analysis, while AutoIt scripts disguised as error dialogs maintained continuous C2 communication.
First reported: 11.11.2025 18:451 source, 1 articleShow sources
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
The campaign employed a two-stage process: spear-phishing via KakaoTalk to compromise PCs, followed by remote wipe of Android devices to sever communication channels and erase forensic evidence.
First reported: 11.11.2025 18:451 source, 1 articleShow sources
- Android Devices Targeted By KONNI APT in Find Hub Exploitation — www.infosecurity-magazine.com — 11.11.2025 18:45
-
EtherRAT is a new Linux malware implant that exploits the React2Shell vulnerability (CVE-2025-55182) in Next.js applications to execute a multi-stage attack chain.
First reported: 09.12.2025 17:432 sources, 2 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
EtherRAT uses five distinct Linux persistence mechanisms: cron jobs, bashrc injection, XDG autostart, systemd user service, and profile injection.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
The malware leverages Ethereum smart contracts for C2 communication, querying nine public Ethereum RPC providers in parallel to prevent single-node poisoning or sinkholing.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
EtherRAT employs a self-updating mechanism by sending its source code to an API endpoint, receiving obfuscated replacement code to evade static detection.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
The attack chain begins with React2Shell exploitation to execute a base64-encoded shell command, downloading a malicious script (s.sh) that fetches a Node.js runtime and deploys an obfuscated JavaScript dropper.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
EtherRAT's encrypted loader pattern closely resembles the DPRK-affiliated BeaverTail malware used in Contagious Interview campaigns, suggesting a shared development lineage.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
The malware executes JavaScript payloads returned from C2 every 500 ms using an AsyncFunction constructor, functioning as a fully interactive Node.js shell.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
EtherRAT was recovered from a compromised Next.js application just two days after the public disclosure of CVE-2025-55182, indicating rapid weaponization by North Korean actors.
First reported: 09.12.2025 17:433 sources, 3 articlesShow sources
- North Korean hackers exploit React2Shell flaw in EtherRAT malware attacks — www.bleepingcomputer.com — 09.12.2025 17:43
- React2Shell Exploit Campaigns Tied to North Korean Cyber Intrusion Tactics — www.infosecurity-magazine.com — 09.12.2025 19:15
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
EtherRAT queries nine public Ethereum RPC endpoints in parallel and uses a consensus mechanism to select the C2 URL returned by the majority, preventing sinkholing or poisoning by a single compromised node.
First reported: 09.12.2025 20:251 source, 1 articleShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
The EtherRAT dropper decrypts the payload with a hard-coded key and spawns it using a downloaded Node.js v20.10.0 binary, then deletes the shell script to minimize forensic traces.
First reported: 09.12.2025 20:251 source, 1 articleShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
EtherRAT enters a 500 ms polling loop with the C2 server, executing any response longer than 10 characters as JavaScript code on the infected machine.
First reported: 09.12.2025 20:251 source, 1 articleShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
Contagious Interview has shifted tactics to lure victims into cloning malicious repositories on GitHub/GitLab/Bitbucket, using VS Code's auto-run tasks.json to execute a loader script upon project opening.
First reported: 09.12.2025 20:251 source, 2 articlesShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The VS Code-based attack chain downloads a 'vscode-bootstrap.sh' script that fetches 'package.json' and 'env-setup.js', which serve as launchpads for BeaverTail and InvisibleFerret malware.
First reported: 09.12.2025 20:251 source, 2 articlesShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
OpenSourceMalware identified 13 versions of the VS Code campaign across 27 GitHub users and 11 BeaverTail variants, with repositories dating from April 22, 2025, to December 1, 2025.
First reported: 09.12.2025 20:251 source, 2 articlesShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
North Korean actors have consolidated their hosting infrastructure on Vercel, abandoning Fly.io, Platform.sh, and Render for Contagious Interview operations.
First reported: 09.12.2025 20:251 source, 1 articleShow sources
- North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware — thehackernews.com — 09.12.2025 20:25
-
The Contagious Interview campaign now uses malicious VS Code projects as lures, instructing targets to clone repositories on GitHub, GitLab, or Bitbucket and open them in VS Code as part of a job assessment.
First reported: 20.01.2026 20:412 sources, 2 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
The attack abuses VS Code's task configuration files (tasks.json) to execute malicious payloads hosted on Vercel domains, with the task set to run automatically upon folder opening via the 'runOn: folderOpen' option.
First reported: 20.01.2026 20:412 sources, 2 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
The campaign delivers BeaverTail and InvisibleFerret malware via obfuscated JavaScript embedded in tasks.json, executed when the victim opens the project in VS Code.
First reported: 20.01.2026 20:412 sources, 2 articlesShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
Multi-stage droppers are concealed as spell-check dictionaries in task configuration files, serving as a fallback mechanism if the primary payload retrieval from Vercel fails.
First reported: 20.01.2026 20:411 source, 1 articleShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
A new infection method delivers a backdoor offering remote code execution on compromised hosts, using a background shell command on macOS (nohup bash -c with curl) to fetch and execute JavaScript payloads via Node.js.
First reported: 20.01.2026 20:411 source, 1 articleShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The backdoor establishes a persistent execution loop to harvest host information and communicate with a remote server, with additional JavaScript instructions executed ~8 minutes post-infection to beacon every 5 seconds and erase traces upon operator command.
First reported: 20.01.2026 20:411 source, 1 articleShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The campaign now uses a malicious npm dependency named 'grayavatar' as a fallback method to deliver a Node.js controller capable of logging keystrokes, capturing screenshots, scanning for sensitive files, substituting cryptocurrency wallet addresses, and stealing browser credentials.
First reported: 20.01.2026 20:411 source, 1 articleShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
A parallel Python environment is set up using a stager script to enable data collection, cryptocurrency mining (XMRig), keylogging, and AnyDesk deployment for remote access.
First reported: 20.01.2026 20:411 source, 1 articleShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The Node.js and Python layers are referred to as BeaverTail and InvisibleFerret, respectively, with the campaign using multiple delivery methods (VS Code tasks, npm dependencies, direct JavaScript execution) to increase success rates.
First reported: 20.01.2026 20:411 source, 1 articleShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
Attackers impersonate recruiters (e.g., CTO of 'Meta2140') on LinkedIn, sharing Notion.so links with technical assessments and malicious Bitbucket repositories to lure victims.
First reported: 20.01.2026 20:411 source, 1 articleShow sources
- North Korea-Linked Hackers Target Developers via Malicious VS Code Projects — thehackernews.com — 20.01.2026 20:41
-
The Contagious Interview campaign now delivers a **new JavaScript-based backdoor** via malicious VS Code repositories, executed automatically when victims grant repository trust and open the project.
First reported: 22.01.2026 00:001 source, 1 articleShow sources
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
The backdoor runs invisibly in the background on macOS using a **hidden Node.js command**, persisting even after VS Code is closed and producing no visible output to evade detection.
First reported: 22.01.2026 00:001 source, 1 articleShow sources
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
The malicious repositories remain online for **at least two weeks** before removal, indicating a sustained window for victim exploitation.
First reported: 22.01.2026 00:001 source, 1 articleShow sources
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
The campaign continues to refine **social engineering tactics**, focusing on developers familiar with Node.js and blockchain/cryptocurrency projects, with motives spanning **espionage, initial access brokerage, and financial gain**.
First reported: 22.01.2026 00:001 source, 1 articleShow sources
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
-
Jamf Threat Labs recommends developers **vet repositories before marking them as trusted** in VS Code and scrutinize `package.json`, install scripts, and task configuration files to avoid unintended malicious execution.
First reported: 22.01.2026 00:001 source, 1 articleShow sources
- 'Contagious Interview' Attack Now Delivers Backdoor Via VS Code — www.darkreading.com — 22.01.2026 00:00
Similar Happenings
Black Basta Leader Identified and Added to Interpol's Red Notice List
Law enforcement in Ukraine and Germany have identified Oleg Evgenievich Nefedov, a 35-year-old Russian national, as the leader of the Black Basta ransomware gang. Nefedov, known by multiple aliases, has been added to Europol's 'Most Wanted' and Interpol's 'Red Notice' lists. Ukrainian police, in collaboration with German authorities, identified two additional individuals involved in initial network breaches and privilege escalation for ransomware attacks. These individuals were found to be 'hash crackers', specializing in extracting passwords from account databases. Raids in Ukraine seized digital storage devices and cryptocurrency assets. Black Basta has targeted over 500 companies globally and is estimated to have earned hundreds of millions of dollars in cryptocurrency. Nefedov is believed to have ties to Russian intelligence agencies and was arrested in Armenia but secured his freedom. The group's internal chat logs leaked, revealing its structure and key members, and its data leak site was taken down in February 2025. Former affiliates may have migrated to the CACTUS ransomware operation.
VoidLink Malware Framework Targets Cloud and Container Environments
A new advanced Linux malware framework, codenamed VoidLink, has been discovered targeting cloud and container environments. Developed by a single person with the help of an artificial intelligence model, VoidLink is a highly modular and flexible framework designed for long-term, stealthy access to Linux-based systems. It includes custom loaders, implants, rootkits, and over 30 plugins, enabling operators to adapt its capabilities over time. The malware is engineered to detect major cloud environments and adapt its behavior when running within Docker containers or Kubernetes pods. It also gathers credentials associated with cloud environments and source code version control systems like Git. VoidLink's capabilities include anti-forensics, reconnaissance, credential harvesting, lateral movement, and persistence, making it a full-fledged post-exploitation framework. The framework is written primarily in the Zig programming language and includes plans to extend its detection capabilities to additional cloud environments such as Huawei, DigitalOcean, and Vultr. VoidLink's documentation suggests it is intended for commercial purposes, and its development environment includes debug symbols and other development artifacts, indicating in-progress builds. VoidLink uses a custom encrypted messaging layer called 'VoidStream' to camouflage traffic and includes 35 plugins in the default configuration. The framework employs rootkit modules to hide processes, files, network sockets, or the rootkit itself, and includes advanced anti-analysis mechanisms to detect debuggers, perform runtime code encryption, and integrity checks. VoidLink's anti-forensic modules erase logs, shell history, login records, and securely overwrite all files dropped on the host, minimizing exposure to forensic investigations. VoidLink was developed with the help of an artificial intelligence model, reaching a functional iteration in under a week. The developer used Spec-Driven Development (SDD) to define the project's goals and set constraints, with the AI generating a multi-team development plan. VoidLink reached 88,000 lines of code by early December 2025, and researchers successfully reproduced the workflow, confirming that an AI agent can generate code similar to VoidLink's. The developer utilized regular checkpoints to check in on the AI-generated code to ensure that the model was developing it as instructed and that the code worked.
CyberVolk's VolkLocker ransomware flaw allows free decryption
CyberVolk, a pro-Russia hacktivist group, launched VolkLocker ransomware-as-a-service (RaaS) with a critical cryptographic flaw. The ransomware uses a hardcoded master key stored in plaintext, enabling victims to decrypt files without paying the ransom. VolkLocker targets both Linux/VMware ESXi and Windows systems and includes a timer function that wipes user folders if the ransom is not paid. The group also offers a remote access trojan and a keylogger for sale. The flaw in VolkLocker's cryptography was discovered by SentinelOne researchers, who noted that the master key is written to a plaintext file in the %TEMP% folder, allowing victims to recover their files. This weakness undermines the ransomware's effectiveness and highlights the group's inexperience in cybercrime operations. VolkLocker is written in Golang and attempts to escalate privileges and perform reconnaissance and system enumeration. It makes Windows Registry modifications to thwart recovery and analysis, deletes volume shadow copies, and terminates processes associated with Microsoft Defender Antivirus and other common analysis tools. The ransomware uses an enforcement timer that wipes the content of user folders if victims fail to pay within 48 hours or enter the wrong decryption key three times. VolkLocker payloads come with built-in Telegram automation for command-and-control, allowing users to message victims, initiate file decryption, list active victims, and get system information.
Chinese Hackers Exploit React2Shell Vulnerability (CVE-2025-55182) in Targeted Campaigns
Two China-linked hacking groups, Earth Lamia and Jackpot Panda, have begun exploiting the newly disclosed React2Shell vulnerability (CVE-2025-55182) in React Server Components, which allows unauthenticated remote code execution. The vulnerability was addressed in React versions 19.0.1, 19.1.2, and 19.2.1. The groups have targeted various sectors, including financial services, logistics, retail, IT, universities, and government organizations across Latin America, the Middle East, and Southeast Asia. The attacks involve running discovery commands, writing files, and reading sensitive information, demonstrating a systematic approach to exploit multiple vulnerabilities simultaneously.
React2Shell vulnerability exploited by China-linked threat actors
Multiple China-linked threat actors, including Earth Lamia and Jackpot Panda, have begun exploiting the critical React2Shell vulnerability (CVE-2025-55182) in React and Next.js. This insecure deserialization flaw allows unauthenticated remote execution of JavaScript code in the server's context. The vulnerability affects multiple versions of the widely used libraries, potentially exposing thousands of dependent projects. AWS reports active exploitation attempts within hours of the public disclosure, with attackers using a mix of public exploits and manual testing to refine their techniques.