Lazarus Group Expands Operations with AI-Generated Video, Malware, and Malicious Packages in Cryptocurrency and Defense Sectors
Summary
Hide ▲
Show ▼
The North Korean Lazarus Group (UNC1069, also tracked as WaterPlum) continues to expand its operations with new malware and refined tactics targeting the cryptocurrency and defense sectors. Recent activity includes the deployment of StoatWaffle, a modular malware delivered via malicious Visual Studio Code (VS Code) projects, which abuses auto-run tasks to maintain persistence and execute next-stage payloads. The malware includes stealer and RAT modules, targeting sensitive data such as browser credentials and iCloud Keychain on macOS. The threat actor has also disseminated additional malware families—including PylangGhost, PolinRider, and FlexibleFerret (WeaselStore)—through npm packages, GitHub repositories, and staged recruitment processes. Targets include founders, CTOs, and senior engineers in cryptocurrency and Web3 sectors, often approached via LinkedIn or fake job interviews. Microsoft has introduced mitigations in VS Code (v1.109/1.110) to block auto-run tasks, addressing abuse of the 'tasks.json' file. The campaign overlaps with previously documented activity by UNC1069 and GhostCall, highlighting the group's persistent focus on the open-source ecosystem and cross-platform attacks.
Timeline
-
11.02.2026 00:17 8 articles · 1mo ago
UNC1069 Targets Cryptocurrency Sector with AI-Generated Video and Malware
The article provides additional details on the attack, including the use of a compromised cryptocurrency executive's Telegram account to target a secondary victim. The attackers sent a Calendly link to schedule a 30-minute meeting that directed to a spoofed Zoom meeting hosted on the threat actor's infrastructure. The spoofed Zoom call was a deepfake video posing as another cryptocurrency executive. The attackers tricked the victim into troubleshooting audio issues by running malicious commands on their macOS device. The command installed a backdoor that enabled follow-on activity, including deployment of a downloader for additional tooling and a second backdoor. The additional tools included two data miners to seize keychain credentials, browser data, Telegram user data, and Apple Notes user data. UNC1069 uses large language models (LLMs) like Gemini to conduct research and develop tooling for attacks. Additionally, the Lazarus Group has been active since May 2025 with a campaign codenamed graphalgo, involving malicious packages in npm and PyPI repositories. Developers are targeted via social platforms like LinkedIn, Facebook, and Reddit. The campaign includes a fake company named Veltrix Capital in the blockchain and cryptocurrency trading space. Malicious packages are used to deploy a remote access trojan (RAT) that fetches and executes commands from an external server. The RAT supports commands to gather system information, enumerate files and directories, list running processes, create folders, rename files, delete files, and upload/download files. The command-and-control (C2) communication is protected by a token-based mechanism. The campaign checks for the MetaMask browser extension, indicating a focus on cryptocurrency theft. A malicious npm package called "duer-js" was found to harbor a Windows information stealer called Bada Stealer, capable of gathering Discord tokens, passwords, cookies, autofill data, cryptocurrency wallet details, and system information. Another malware campaign weaponizes npm to extort cryptocurrency payments from developers during package installation, blocking installation until victims pay 0.1 USDC/ETH to the attacker's wallet. The campaign has been ongoing since at least May 2025 and is characterized by modularity, allowing the threat actor to quickly resume it in case of partial compromise. The threat actor relies on packages published on the npm and PyPI registries that act as downloaders for a remote access trojan (RAT). Researchers found 192 malicious packages related to this campaign, which they dubbed 'Graphalgo'. The threat actor creates fake companies in the blockchain and crypto-trading sectors and publishes job offerings on various platforms, like LinkedIn, Facebook, and Reddit. Developers applying for the job are required to show their skills by running, debugging, and improving a given project, which causes a malicious dependency from a legitimate repository to be installed and executed. The package named 'bigmathutils,' with 10,000 downloads, was benign until it reached version 1.1.0, which introduced malicious payloads. The package was later removed and marked as deprecated. The Graphalgo name of the campaign is derived from packages that have 'graph' in their name, typically impersonating legitimate, popular libraries like graphlib. From December 2025 onward, the North Korean actor shifted to packages with 'big' in their name. The actor uses Github Organizations, which are shared accounts for collaboration across multiple projects. Malicious code is introduced indirectly via dependencies hosted on npm and PyPI. The RAT can list the running processes on the host, execute arbitrary commands per instructions from the command-and-control (C2) server, and exfiltrate files or drop additional payloads. The RAT checks whether the MetaMask cryptocurrency extension is installed on the victim’s browser, indicating its money-stealing goals. The RAT's C2 communication is token-protected to lock out unauthorized observers, a common tactic for North Korean hackers. ReversingLabs has found multiple variants written in JavaScript, Python, and VBS, showing an intention to cover all possible targets. ReversingLabs attributes the Graphalgo fake recruiter campaign to the Lazarus group with medium-to-high confidence based on the approach, the use of coding tests as an infection vector, and the cryptocurrency-focused targeting, all of which align with previous activity associated with the North Korean threat actor. The delayed activation of malicious code in the packages is consistent with Lazarus' patience displayed in other attacks. The Git commits show the GMT +9 time zone, matching North Korea time. In a new iteration of the ongoing Contagious Interview campaign, North Korean hackers have published 26 malicious npm packages to the npm registry. These packages masquerade as developer tools but contain functionality to extract the actual command-and-control (C2) by using Pastebin content as a dead drop resolver. The C2 infrastructure is hosted on Vercel across 31 deployments. The campaign is being tracked under the moniker StegaBin. The loader extracts C2 URLs steganographically encoded within three Pastebin pastes, which are innocuous computer science essays. The decoder strips zero-width Unicode characters, reads a 5-digit length marker from the beginning, calculates evenly-spaced character positions throughout the text, and extracts the characters at those positions. The extracted characters are then split on a ||| separator to produce an array of C2 domain names. The malware reaches out to the decoded domain to fetch platform-specific payloads for Windows, macOS, and Linux. The Trojan connects to 103.106.67[.]63:1244 to await further instructions that allow it to change the current directory and execute shell commands. The comprehensive intelligence collection suite contains nine modules to facilitate Microsoft Visual Studio Code (VS Code) persistence, keylogging and clipboard theft, browser credential harvesting, TruffleHog secret scanning, and Git repository and SSH key exfiltration. The vs module uses a malicious tasks.json file to contact a Vercel domain every time a project is opened in VS Code. The clip module acts as a keylogger, mouse tracker, and clipboard stealer with support for active window tracking and conducts periodic exfiltration every 10 minutes. The bro module is a Python payload to steal browser credential stores. The j module is a Node.js module used for browser and cryptocurrency theft by targeting Google Chrome, Brave, Firefox, Opera, and Microsoft Edge, and extensions like MetaMask, Phantom, Coinbase Wallet, Binance, Trust, Exodus, and Keplr. The z module enumerates the file system and steals files matching certain predefined patterns. The n module acts as a RAT to grant the attacker the ability to remotely control the infected host in real-time via a persistent WebSocket connection to 103.106.67[.]63:1247 and exfiltrate data of interest over FTP. The truffle module downloads the legitimate TruffleHog secrets scanner from the official GitHub page to discover and exfiltrate developer secrets. The git module collects files from .ssh directories, extracts Git credentials, and scans repositories. The sched module is the same as "vendor/scrypt-js/version.js" and is redeployed as a persistence mechanism. The North Korean actors have also been observed publishing malicious npm packages (e.g., express-core-validator) to fetch a next-stage JavaScript payload hosted on Google Drive. Only a single package has been published with this new technique, indicating that FAMOUS CHOLLIMA will continue to leverage multiple techniques and infrastructure to deliver follow-on payloads.
Show sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
- North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware — thehackernews.com — 23.03.2026 20:09
-
23.10.2025 15:38 5 articles · 5mo ago
Lazarus Group Targets European Defense Companies in Operation DreamJob
The campaign began in late March 2025. The attackers used a trojanized PDF reader to deliver malware. The campaign exhibits overlaps with clusters tracked as DeathNote, NukeSped, Operation In(ter)ception, and Operation North Star. The campaign could be focused on collecting information on weapon systems deployed in Ukraine, as well as gathering information to perfect designs and processes. At least two of the victims are heavily involved in the development of UAV technology, with one making critical drone components and the other building UAV-related software.
Show sources
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
-
02.09.2025 19:39 3 articles · 6mo ago
Lazarus Group Deploys Multiple RATs in DeFi Sector Campaign
In 2024, the Lazarus Group targeted a DeFi organization using a social engineering campaign. The attack involved the deployment of PondRAT, ThemeForestRAT, and RemotePE. The attackers used various tools for discovery, credential harvesting, and proxy connections, eventually transitioning to stealthier RATs for more complex tasks. The campaign began with impersonation on Telegram and fake scheduling websites, leading to the compromise of an employee's system.
Show sources
- Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE — thehackernews.com — 02.09.2025 19:39
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
Information Snippets
-
The Lazarus Group targeted a DeFi organization in 2024.
First reported: 02.09.2025 19:394 sources, 7 articlesShow sources
- Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE — thehackernews.com — 02.09.2025 19:39
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The attack began with social engineering on Telegram and fake scheduling websites.
First reported: 02.09.2025 19:395 sources, 8 articlesShow sources
- Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE — thehackernews.com — 02.09.2025 19:39
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
PerfhLoader was used to deploy PondRAT, a stripped-down variant of POOLRAT.
First reported: 02.09.2025 19:391 source, 1 articleShow sources
- Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE — thehackernews.com — 02.09.2025 19:39
-
PondRAT was used in combination with ThemeForestRAT for approximately three months.
First reported: 02.09.2025 19:391 source, 1 articleShow sources
- Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE — thehackernews.com — 02.09.2025 19:39
-
ThemeForestRAT shares similarities with RomeoGolf, used in the 2014 Sony Pictures Entertainment attack.
First reported: 02.09.2025 19:391 source, 1 articleShow sources
- Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE — thehackernews.com — 02.09.2025 19:39
-
RemotePE, a more advanced RAT, was deployed for high-value targets.
First reported: 02.09.2025 19:391 source, 1 articleShow sources
- Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE — thehackernews.com — 02.09.2025 19:39
-
The attackers used various tools for discovery, credential harvesting, and proxy connections.
First reported: 02.09.2025 19:392 sources, 2 articlesShow sources
- Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE — thehackernews.com — 02.09.2025 19:39
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
-
The attack involved the use of Mimikatz, FRPC, and proxy programs like MidProxy and Proxy Mini.
First reported: 02.09.2025 19:392 sources, 2 articlesShow sources
- Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE — thehackernews.com — 02.09.2025 19:39
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
-
PondRAT communicates over HTTP(S) with a hard-coded command-and-control (C2) server.
First reported: 02.09.2025 19:391 source, 1 articleShow sources
- Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE — thehackernews.com — 02.09.2025 19:39
-
ThemeForestRAT can execute a wide range of commands, including file operations, shellcode injection, and process spawning.
First reported: 02.09.2025 19:391 source, 1 articleShow sources
- Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE — thehackernews.com — 02.09.2025 19:39
-
The Lazarus Group targeted European defense companies in 2025.
First reported: 23.10.2025 15:384 sources, 4 articlesShow sources
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
Operation DreamJob involved fake recruitment lures to compromise defense sector organizations.
First reported: 23.10.2025 15:384 sources, 4 articlesShow sources
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The campaign targeted UAV technology developers in Southeastern and Central Europe.
First reported: 23.10.2025 15:384 sources, 4 articlesShow sources
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The attack used trojanized open-source applications and plugins to deliver malware.
First reported: 23.10.2025 15:384 sources, 4 articlesShow sources
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The ScoringMathTea RAT was used to establish communication with the C2 infrastructure.
First reported: 23.10.2025 15:384 sources, 4 articlesShow sources
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
BinMergeLoader (MISTPEN) was used to retrieve additional payloads via Microsoft Graph API.
First reported: 23.10.2025 15:382 sources, 2 articlesShow sources
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
-
The ScoringMathTea RAT supports 40 commands, providing broad operational versatility.
First reported: 23.10.2025 15:382 sources, 2 articlesShow sources
- North Korean Lazarus hackers targeted European defense companies — www.bleepingcomputer.com — 23.10.2025 15:38
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
-
The campaign targeted three European firms: a metal engineering company, an aircraft components manufacturer, and a defense contractor.
First reported: 23.10.2025 16:303 sources, 3 articlesShow sources
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The malware was delivered through a series of droppers and loaders disguised as legitimate software components, including manipulated open-source projects from GitHub.
First reported: 23.10.2025 16:303 sources, 3 articlesShow sources
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The key malicious file, DroneEXEHijackingLoader.dll, indicates the campaign specifically sought UAV-related data.
First reported: 23.10.2025 16:303 sources, 3 articlesShow sources
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The timing of the attacks coincides with North Korean soldiers supporting Russian operations in Ukraine.
First reported: 23.10.2025 16:303 sources, 3 articlesShow sources
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The attackers introduced new elements to their toolset in 2025, including trojanized open-source applications such as TightVNC Viewer and MuPDF.
First reported: 23.10.2025 16:302 sources, 2 articlesShow sources
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
-
The attackers used new loaders and downloaders built from DirectX Wrappers and Notepad++ plugins.
First reported: 23.10.2025 16:302 sources, 2 articlesShow sources
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
-
ESET concluded that this latest campaign underscores the persistent risk faced by the defense sector, particularly those engaged in UAV research.
First reported: 23.10.2025 16:302 sources, 2 articlesShow sources
- Lazarus Group’s Operation DreamJob Targets European Defense Firms — www.infosecurity-magazine.com — 23.10.2025 16:30
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
-
The campaign began in late March 2025.
First reported: 23.10.2025 18:292 sources, 2 articlesShow sources
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The attackers used a trojanized PDF reader to deliver malware.
First reported: 23.10.2025 18:292 sources, 2 articlesShow sources
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The attackers used a sophisticated downloader codenamed BinMergeLoader to fetch additional payloads via Microsoft Graph API.
First reported: 23.10.2025 18:291 source, 1 articleShow sources
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
-
The campaign exhibits overlaps with clusters tracked as DeathNote, NukeSped, Operation In(ter)ception, and Operation North Star.
First reported: 23.10.2025 18:292 sources, 3 articlesShow sources
- North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets — thehackernews.com — 23.10.2025 18:29
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
Lazarus Group, also known as Diamond Sleet, Hidden Cobra, and Zinc, has been active since at least 2009.
First reported: 24.10.2025 16:243 sources, 3 articlesShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The group has been engaging in intrusion campaigns targeting the aerospace, defense, engineering, media and entertainment, and technology sectors.
First reported: 24.10.2025 16:241 source, 1 articleShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The attackers used a trojanized open-source PDF reader to deploy the ScoringMathTea RAT.
First reported: 24.10.2025 16:241 source, 1 articleShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The campaign could be focused on collecting information on weapon systems deployed in Ukraine.
First reported: 24.10.2025 16:241 source, 1 articleShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The attacks occurred while North Korean soldiers were active in Russia to help repel Ukraine’s offensive in the Kursk region.
First reported: 24.10.2025 16:241 source, 1 articleShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The victim organizations produce materials that North Korea manufactures domestically.
First reported: 24.10.2025 16:241 source, 1 articleShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The intrusions could be aimed at gathering information to perfect designs and processes.
First reported: 24.10.2025 16:241 source, 1 articleShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
At least two of the victims are heavily involved in the development of UAV technology.
First reported: 24.10.2025 16:241 source, 1 articleShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
One victim makes critical drone components, while the other is engaged in building UAV-related software.
First reported: 24.10.2025 16:241 source, 1 articleShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
North Korea is investing heavily in domestic drone manufacturing capabilities.
First reported: 24.10.2025 16:241 source, 1 articleShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
North Korea is receiving assistance from Russia to produce its version of the Iranian-made Shahed drone.
First reported: 24.10.2025 16:241 source, 1 articleShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
North Korea has developed its domestic UAV capabilities through reverse engineering and the theft of intellectual property.
First reported: 24.10.2025 16:241 source, 1 articleShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
The Saetbyol-4 and Saetbyol-9 drones are copies of the Northrop Grumman RQ-4 Global Hawk and General Atomics MQ-9 Reaper, respectively.
First reported: 24.10.2025 16:241 source, 1 articleShow sources
- North Korean Hackers Aim at European Drone Companies — www.securityweek.com — 24.10.2025 16:24
-
North Korean hackers are using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
The threat actor's goal is financial, as suggested by the role of the tools used in an attack on a fintech company investigated by Google's Mandiant researchers.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
Mandiant researchers found seven distinct macOS malware families attributed to UNC1069, a threat group they've been tracking since 2018.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
The attack had a strong social engineering component as the victim was contacted over the Telegram messaging service from a compromised account of an executive at a cryptocurrency company.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
The hackers shared a Calendly link that took the victim to a spoofed Zoom meeting page on the attacker's infrastructure.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
The hackers showed a deepfake video of a CEO at another cryptocurrency company.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
The attacker instructed the victim to troubleshoot the problems using commands present on a webpage.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
Mandiant found commands on the page for both Windows and macOS that would start the infection chain.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
Huntress researchers documented a similar attack method in mid-2025 and attributed it to the BlueNoroff group, another North Korean adversary.
First reported: 11.02.2026 00:173 sources, 3 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
Mandiant researcher found evidence of AppleScript execution once the infection chain started, but could not recover the contents of the payload, followed by deploying a malicious Mach-O binary.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
In the next stage, the attacker executed seven distinct malware families: WAVESHAPER, HYPERCALL, HIDDENCALL, SILENCELIFT, DEEPBREATH, SUGARLOADER, and CHROMEPUSH.
First reported: 11.02.2026 00:172 sources, 2 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
-
Of the malware found, SUGARLOADER has the most detections on the VirusTotal scanning platform, followed by WAVESHAPER, which is flagged by just two products.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
Mandiant says that SILENCELIFT, DEEPBREATH, and CHROMEPUSH represent a new set of tooling for the threat actor.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
The researchers describe as unusual the volume of malware deployed on a host against a single individual.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
This confirms a targeted attack focused on collecting as much data as possible for two reasons: "cryptocurrency theft and fueling future social engineering campaigns by leveraging victim’s identity and data."
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
Since 2018, UNC1069 has demonstrated its ability to evolve by adopting new techniques and tools.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
In 2023, the bad actor switched to targets in the Web3 industry (centralized exchanges, developers, venture capital funds).
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
Last year, the threat actor changed its target to financial services and the cryptocurrency industry in verticals such as payments, brokerage, and wallet infrastructure.
First reported: 11.02.2026 00:174 sources, 4 articlesShow sources
- North Korean hackers use new macOS malware in crypto-theft attacks — www.bleepingcomputer.com — 11.02.2026 00:17
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
-
UNC1069 has been active since at least April 2018.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 is also tracked under the monikers CryptoCore and MASAN.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has used generative AI tools like Gemini to produce lure material and other messaging related to cryptocurrency.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has attempted to misuse Gemmini to develop code to steal cryptocurrency.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has leveraged deepfake images and video lures mimicking individuals in the cryptocurrency industry.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has distributed a backdoor called BIGMACHO to victims by passing it off as a Zoom software development kit (SDK).
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has shifted from spear-phishing techniques and traditional finance (TradFi) targeting towards the Web3 industry since at least 2023.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has targeted centralized exchanges (CEX), software developers at financial institutions, high-technology companies, and individuals at venture capital funds.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has deployed as many as seven unique malware families, including several new malware families such as SILENCELIFT, DEEPBREATH, and CHROMEPUSH.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has used a fake website masquerading as Zoom (zoom.uswe05[.]us) to deceive victims.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has reused videos of previous victims to deceive new victims, making them believe they were participating in a genuine live call.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has used a ClickFix-style troubleshooting command to deliver malware to victims.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has used an AppleScript to drop a malicious Mach-O binary on macOS systems.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has used a malicious C++ executable called WAVESHAPER to gather system information and distribute a Go-based downloader codenamed HYPERCALL.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has used a Golang backdoor component known as HIDDENCALL to provide hands-on keyboard access to the compromised system.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has used a Swift-based data miner called DEEPBREATH to manipulate macOS's Transparency, Consent, and Control (TCC) database.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has used a second C++ downloader called SUGARLOADER to deploy CHROMEPUSH.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has used a minimalist C/C++ backdoor referred to as SILENCELIFT to send system information to a command-and-control (C2) server.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has used DEEPBREATH to steal iCloud Keychain credentials, and data from Google Chrome, Brave, and Microsoft Edge, Telegram, and the Apple Notes application.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has used CHROMEPUSH as a data stealer, written in C++, to record keystrokes, observe username and password inputs, and extract browser cookies.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 has deployed multiple new malware families alongside the known downloader SUGARLOADER, marking a significant expansion in their capabilities.
First reported: 11.02.2026 08:503 sources, 4 articlesShow sources
- North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations — thehackernews.com — 11.02.2026 08:50
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The attackers used a hijacked Telegram profile of a cryptocurrency executive to build trust and rapport before sending a calendar invite to join a meeting.
First reported: 11.02.2026 18:353 sources, 3 articlesShow sources
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The meeting was designed to look like Zoom but was hosted on attacker-controlled infrastructure.
First reported: 11.02.2026 18:353 sources, 3 articlesShow sources
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The victim was faced with a deepfake of the cryptocurrency executive during the meeting.
First reported: 11.02.2026 18:353 sources, 3 articlesShow sources
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The attacker claimed the victim was having audio issues and offered a solution to help, which was a ClickFix attack.
First reported: 11.02.2026 18:353 sources, 3 articlesShow sources
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The attackers dropped malicious files onto the device, including Waveshaper and Hypercall backdoors.
First reported: 11.02.2026 18:353 sources, 3 articlesShow sources
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The attackers installed information stealer malware and a data miner, Deepbreath and CHROMEPUSH, to gain further control and persistence over the machine.
First reported: 11.02.2026 18:353 sources, 3 articlesShow sources
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The malware allowed the attackers to steal credentials from the user's Keychain, browser data from Chrome, Brave, and Edge, user data from two different versions of Telegram, and user data from Apple Notes.
First reported: 11.02.2026 18:353 sources, 3 articlesShow sources
- North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms — www.infosecurity-magazine.com — 11.02.2026 18:35
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 used a compromised cryptocurrency executive's Telegram account to target a secondary victim.
First reported: 11.02.2026 23:562 sources, 2 articlesShow sources
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The attackers sent a Calendly link to schedule a 30-minute meeting that directed to a spoofed Zoom meeting hosted on the threat actor's infrastructure.
First reported: 11.02.2026 23:562 sources, 2 articlesShow sources
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The spoofed Zoom call was a deepfake video posing as another cryptocurrency executive.
First reported: 11.02.2026 23:562 sources, 2 articlesShow sources
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The attackers tricked the victim into troubleshooting audio issues by running malicious commands on their macOS device.
First reported: 11.02.2026 23:562 sources, 2 articlesShow sources
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The command installed a backdoor that enabled follow-on activity, including deployment of a downloader for additional tooling and a second backdoor.
First reported: 11.02.2026 23:562 sources, 2 articlesShow sources
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The additional tools included two data miners to seize keychain credentials, browser data, Telegram user data, and Apple Notes user data.
First reported: 11.02.2026 23:562 sources, 2 articlesShow sources
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
UNC1069 uses large language models (LLMs) like Gemini to conduct research and develop tooling for attacks.
First reported: 11.02.2026 23:562 sources, 2 articlesShow sources
- North Korea's UNC1069 Hammers Crypto Firms With AI — www.darkreading.com — 11.02.2026 23:56
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
-
The Lazarus Group has been active since May 2025 with a campaign codenamed graphalgo.
First reported: 12.02.2026 18:552 sources, 3 articlesShow sources
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The campaign involves malicious packages in npm and PyPI repositories.
First reported: 12.02.2026 18:552 sources, 3 articlesShow sources
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
Developers are targeted via social platforms like LinkedIn, Facebook, and Reddit.
First reported: 12.02.2026 18:552 sources, 3 articlesShow sources
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The campaign includes a fake company named Veltrix Capital in the blockchain and cryptocurrency trading space.
First reported: 12.02.2026 18:552 sources, 3 articlesShow sources
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
Malicious packages are used to deploy a remote access trojan (RAT) that fetches and executes commands from an external server.
First reported: 12.02.2026 18:552 sources, 3 articlesShow sources
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The RAT supports commands to gather system information, enumerate files and directories, list running processes, create folders, rename files, delete files, and upload/download files.
First reported: 12.02.2026 18:552 sources, 3 articlesShow sources
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The command-and-control (C2) communication is protected by a token-based mechanism.
First reported: 12.02.2026 18:552 sources, 3 articlesShow sources
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The campaign checks for the MetaMask browser extension, indicating a focus on cryptocurrency theft.
First reported: 12.02.2026 18:552 sources, 3 articlesShow sources
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
A malicious npm package called "duer-js" was found to harbor a Windows information stealer called Bada Stealer.
First reported: 12.02.2026 18:552 sources, 3 articlesShow sources
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
Bada Stealer is capable of gathering Discord tokens, passwords, cookies, autofill data, cryptocurrency wallet details, and system information.
First reported: 12.02.2026 18:552 sources, 3 articlesShow sources
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
Another malware campaign weaponizes npm to extort cryptocurrency payments from developers during package installation.
First reported: 12.02.2026 18:552 sources, 3 articlesShow sources
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The campaign, dubbed XPACK ATTACK, blocks installation until victims pay 0.1 USDC/ETH to the attacker's wallet.
First reported: 12.02.2026 18:552 sources, 3 articlesShow sources
- Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems — thehackernews.com — 12.02.2026 18:55
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The campaign has been ongoing since at least May 2025 and is characterized by modularity, allowing the threat actor to quickly resume it in case of partial compromise.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The threat actor relies on packages published on the npm and PyPi registries that act as downloaders for a remote access trojan (RAT).
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
Researchers found 192 malicious packages related to this campaign, which they dubbed 'Graphalgo'.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The threat actor creates fake companies in the blockchain and crypto-trading sectors and publishes job offerings on various platforms, like LinkedIn, Facebook, and Reddit.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
Developers applying for the job are required to show their skills by running, debugging, and improving a given project, which causes a malicious dependency from a legitimate repository to be installed and executed.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The package named 'bigmathutils,' with 10,000 downloads, was benign until it reached version 1.1.0, which introduced malicious payloads. The package was later removed and marked as deprecated.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The Graphalgo name of the campaign is derived from packages that have 'graph' in their name, typically impersonating legitimate, popular libraries like graphlib.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
From December 2025 onward, the North Korean actor shifted to packages with 'big' in their name.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The actor uses Github Organizations, which are shared accounts for collaboration across multiple projects. Malicious code is introduced indirectly via dependencies hosted on npm and PyPI.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The RAT can list the running processes on the host, execute arbitrary commands per instructions from the command-and-control (C2) server, and exfiltrate files or drop additional payloads.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The RAT checks whether the MetaMask cryptocurrency extension is installed on the victim’s browser, indicating its money-stealing goals.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The RAT's C2 communication is token-protected to lock out unauthorized observers, a common tactic for North Korean hackers.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
ReversingLabs has found multiple variants written in JavaScript, Python, and VBS, showing an intention to cover all possible targets.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
ReversingLabs attributes the Graphalgo fake recruiter campaign to the Lazarus group with medium-to-high confidence based on the approach, the use of coding tests as an infection vector, and the cryptocurrency-focused targeting, all of which align with previous activity associated with the North Korean threat actor.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The delayed activation of malicious code in the packages is consistent with Lazarus' patience displayed in other attacks.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The Git commits show the GMT +9 time zone, matching North Korea time.
First reported: 14.02.2026 00:352 sources, 2 articlesShow sources
- Fake job recruiters hide malware in developer coding challenges — www.bleepingcomputer.com — 14.02.2026 00:35
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
North Korean hackers have published 26 malicious npm packages to the npm registry as part of the Contagious Interview campaign.
First reported: 02.03.2026 10:441 source, 2 articlesShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
- North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware — thehackernews.com — 23.03.2026 20:09
-
The packages masquerade as developer tools but contain functionality to extract the actual command-and-control (C2) by using Pastebin content as a dead drop resolver.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The C2 infrastructure is hosted on Vercel across 31 deployments.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The campaign is being tracked under the moniker StegaBin.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The loader extracts C2 URLs steganographically encoded within three Pastebin pastes, which are innocuous computer science essays.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The decoder strips zero-width Unicode characters, reads a 5-digit length marker from the beginning, calculates evenly-spaced character positions throughout the text, and extracts the characters at those positions.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The extracted characters are then split on a ||| separator to produce an array of C2 domain names.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The malware reaches out to the decoded domain to fetch platform-specific payloads for Windows, macOS, and Linux.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The Trojan connects to 103.106.67[.]63:1244 to await further instructions that allow it to change the current directory and execute shell commands.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The comprehensive intelligence collection suite contains nine modules to facilitate Microsoft Visual Studio Code (VS Code) persistence, keylogging and clipboard theft, browser credential harvesting, TruffleHog secret scanning, and Git repository and SSH key exfiltration.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The vs module uses a malicious tasks.json file to contact a Vercel domain every time a project is opened in VS Code.
First reported: 02.03.2026 10:441 source, 2 articlesShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
- North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware — thehackernews.com — 23.03.2026 20:09
-
The clip module acts as a keylogger, mouse tracker, and clipboard stealer with support for active window tracking and conducts periodic exfiltration every 10 minutes.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The bro module is a Python payload to steal browser credential stores.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The j module is a Node.js module used for browser and cryptocurrency theft by targeting Google Chrome, Brave, Firefox, Opera, and Microsoft Edge, and extensions like MetaMask, Phantom, Coinbase Wallet, Binance, Trust, Exodus, and Keplr.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The z module enumerates the file system and steals files matching certain predefined patterns.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The n module acts as a RAT to grant the attacker the ability to remotely control the infected host in real-time via a persistent WebSocket connection to 103.106.67[.]63:1247 and exfiltrate data of interest over FTP.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The truffle module downloads the legitimate TruffleHog secrets scanner from the official GitHub page to discover and exfiltrate developer secrets.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The git module collects files from .ssh directories, extracts Git credentials, and scans repositories.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The sched module is the same as "vendor/scrypt-js/version.js" and is redeployed as a persistence mechanism.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
The North Korean actors have also been observed publishing malicious npm packages (e.g., express-core-validator) to fetch a next-stage JavaScript payload hosted on Google Drive.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
Only a single package has been published with this new technique, indicating that FAMOUS CHOLLIMA will continue to leverage multiple techniques and infrastructure to deliver follow-on payloads.
First reported: 02.03.2026 10:441 source, 1 articleShow sources
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT — thehackernews.com — 02.03.2026 10:44
-
North Korean threat actors attributed to the Contagious Interview campaign (also tracked as WaterPlum) have adopted a new malware family named StoatWaffle, distributed via malicious Microsoft Visual Studio Code (VS Code) projects.
First reported: 23.03.2026 20:091 source, 1 articleShow sources
- North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware — thehackernews.com — 23.03.2026 20:09
-
StoatWaffle uses VS Code's 'tasks.json' with 'runOn: folderOpen' to automatically execute malware upon opening any file in the project folder, a tactic adopted since December 2025.
First reported: 23.03.2026 20:091 source, 1 articleShow sources
- North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware — thehackernews.com — 23.03.2026 20:09
-
The malware first checks for Node.js, downloads and installs it if absent, then launches a downloader that polls an external server for next-stage payloads.
First reported: 23.03.2026 20:091 source, 1 articleShow sources
- North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware — thehackernews.com — 23.03.2026 20:09
-
StoatWaffle includes a stealer module targeting credentials and browser extension data (Chromium-based browsers, Mozilla Firefox) and iCloud Keychain on macOS, uploading stolen data to a C2 server.
First reported: 23.03.2026 20:091 source, 1 articleShow sources
- North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware — thehackernews.com — 23.03.2026 20:09
-
A RAT module in StoatWaffle fetches and executes commands to perform file system operations, shell command execution, and recursive file searches/uploads.
First reported: 23.03.2026 20:091 source, 1 articleShow sources
- North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware — thehackernews.com — 23.03.2026 20:09
-
The threat actor has deployed additional malware families such as PylangGhost (via malicious npm packages), PolinRider (malicious JavaScript in GitHub repositories), and FlexibleFerret (Go/Python backdoor, also known as WeaselStore or GolangGhost/PylangGhost).
First reported: 23.03.2026 20:091 source, 1 articleShow sources
- North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware — thehackernews.com — 23.03.2026 20:09
-
Targets include founders, CTOs, and senior engineers in cryptocurrency/Web3 sectors, often approached via LinkedIn or staged fake recruitment processes.
First reported: 23.03.2026 20:091 source, 1 articleShow sources
- North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware — thehackernews.com — 23.03.2026 20:09
-
Microsoft introduced mitigations in January 2026 (VS Code v1.109) and February 2026 (v1.110), including a default-off 'task.allowAutomaticTasks' setting and workspace-level restriction to block auto-run tasks.
First reported: 23.03.2026 20:091 source, 1 articleShow sources
- North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware — thehackernews.com — 23.03.2026 20:09
-
The VS Code auto-run task abuse is part of a broader campaign overlapping with GhostCall and UNC1069, using fake CAPTCHA pages and ClickFix-style attacks to deliver cross-platform payloads.
First reported: 23.03.2026 20:091 source, 1 articleShow sources
- North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware — thehackernews.com — 23.03.2026 20:09
Similar Happenings
Iran-linked Dust Specter Targets Iraqi Officials with AI-Assisted Malware
An Iran-linked cyber threat actor, Dust Specter, has been targeting Iraqi government officials using AI-powered tools and previously undocumented malware. The campaign, detected in January 2026, involves impersonating the Iraqi Ministry of Foreign Affairs and compromising government infrastructure to host malicious payloads. The attack chains include the use of SplitDrop, TwinTask, TwinTalk, and GhostForm malware, with TwinTalk also linked to a previous campaign in July 2025. The campaign employs advanced techniques such as randomly generated URI paths for C2 communication, geofencing, and User-Agent verification. The use of compromised Iraqi government infrastructure and AI-assisted malware development highlights the sophistication of the attack.
341 Malicious ClawHub Skills Target OpenClaw Users with Atomic Stealer
A security audit by Koi Security identified 341 malicious skills on ClawHub, a marketplace for OpenClaw users, which distribute Atomic Stealer malware to steal sensitive data from macOS and Windows systems. The campaign, codenamed ClawHavoc, uses social engineering tactics to trick users into installing malicious prerequisites. The skills masquerade as legitimate tools, including cryptocurrency utilities, YouTube tools, and finance applications. OpenClaw has added a reporting feature and partnered with VirusTotal to scan skills uploaded to ClawHub, providing an additional layer of security for the OpenClaw community. The malware targets API keys, credentials, and other sensitive data, exploiting the open-source ecosystem's vulnerabilities. The campaign coincides with a report from OpenSourceMalware, highlighting the same threat. The intersection of AI agent capabilities and persistent memory amplifies the risks, enabling stateful, delayed-execution attacks. New findings reveal almost 400 fake crypto trading add-ons in the project behind the viral Moltbot/OpenClaw AI assistant tool can lead users to install information-stealing malware. These addons, called skills, masquerade as cryptocurrency trading automation tools and target ByBit, Polymarket, Axiom, Reddit, and LinkedIn. The malicious skills share the same command-and-control (C2) infrastructure, 91.92.242.30, and use sophisticated social engineering to convince users to execute malicious commands which then steals crypto assets like exchange API keys, wallet private keys, SSH credentials, and browser passwords. Additionally, fake OpenClaw installers hosted on GitHub and promoted by Bing AI instructed users to run commands that deployed information stealers and proxy malware. Threat actors set up malicious GitHub repositories posing as OpenClaw installers, which were recommended by Bing in its AI-powered search results. The malicious repositories contained shell scripts paired with Mach-O executables identified as Atomic Stealer malware for macOS users. For Windows users, the threat actor delivered OpenClaw_x64.exe, which deployed multiple malicious executables, including Rust-based malware loaders and Vidar stealer. Another Windows executable delivered was the GhostSocks backconnect proxy malware, designed to convert users' machines into proxy nodes.
Bizarre Bazaar Campaign Exploits Exposed LLM Endpoints
A cybercrime operation named 'Bizarre Bazaar' is actively targeting exposed or poorly authenticated LLM (Large Language Model) service endpoints. Over 35,000 attack sessions were recorded in 40 days, involving unauthorized access to steal computing resources, resell API access, exfiltrate data, and pivot into internal systems. The campaign highlights the emerging threat of 'LLMjacking' attacks, where attackers exploit misconfigurations in LLM infrastructure to monetize access through cryptocurrency mining and darknet markets. The SilverInc service, marketed on Telegram and Discord, resells access to more than 50 AI models in exchange for cryptocurrency or PayPal payments. A recent investigation by SentinelOne SentinelLABS and Censys revealed 175,000 unique Ollama hosts across 130 countries, many of which are configured with tool-calling capabilities, increasing the risk of LLMjacking attacks.
Multi-Stage AitM Phishing and BEC Campaigns Target Energy Sector
Microsoft has identified a multi-stage adversary-in-the-middle (AitM) phishing and business email compromise (BEC) campaign targeting organizations in the energy sector. The attackers abused SharePoint file-sharing services to deliver phishing payloads and created inbox rules to maintain persistence and evade detection. The campaign involved leveraging compromised internal identities to conduct large-scale phishing attacks within and outside the victim organizations. Additionally, the AgreeTo Outlook add-in was hijacked and turned into a phishing kit, stealing over 4,000 Microsoft account credentials. The threat actor deployed a fake Microsoft sign-in page, password collection page, exfiltration script, and redirect, exploiting the add-in's ReadWriteItem permissions. This is the first known instance of malware found on the official Microsoft Marketplace. The add-in was abandoned by its developer and the attacker exploited the abandoned domain to serve the phishing kit. The incident highlights the need for better monitoring of add-ins and their associated URLs.
PluggyApe Backdoor Targets Ukraine's Defense Forces in Charity-Themed Campaign
Ukraine's Defense Forces were targeted in a charity-themed malware campaign between October and December 2025, delivering the PluggyApe backdoor, likely deployed by the Russian threat group Void Blizzard (Laundry Bear). The attacks began with instant messages over Signal or WhatsApp, directing recipients to malicious websites posing as charitable foundations. These sites distributed password-protected archives containing PluggyApe payloads. The malware profiles the host, sends victim information to attackers, and waits for further commands. In February 2026, a new campaign targeting Ukrainian entities was observed, employing judicial and charity-themed lures to deploy a JavaScript-based backdoor codenamed DRILLAPP. This campaign is likely orchestrated by threat actors linked to Russia and shares overlaps with the prior PluggyApe campaign. The malware is capable of uploading and downloading files, leveraging the microphone, and capturing images through the webcam. The threat actor is believed to be active since at least April 2024.