BeaverTail Malware Resurfaces in Malicious npm Packages Focusing on Builders

0
17
BeaverTail Malware Resurfaces in Malicious npm Packages Focusing on Builders


Oct 28, 2024Ravie LakshmananMalware / Menace Intelligence

BeaverTail Malware Resurfaces in Malicious npm Packages Focusing on Builders

Three malicious packages printed to the npm registry in September 2024 have been discovered to include a recognized malware referred to as BeaverTail, a JavaScript downloader and data stealer linked to an ongoing North Korean marketing campaign tracked as Contagious Interview.

The Datadog Safety Analysis staff is monitoring the exercise underneath the title Tenacious Pungsan, which can be recognized by the monikers CL-STA-0240 and Well-known Chollima.

Cybersecurity

The names of the malicious packages, that are now not accessible for obtain from the package deal registry, are listed under –

  • passports-js, a backdoored copy of the passport (118 downloads)
  • bcrypts-js, a backdoored copy of bcryptjs (81 downloads)
  • blockscan-api, a backdoored copy of etherscan-api (124 downloads)

Contagious Interview refers to a yearlong-campaign undertaken by the Democratic Folks’s Republic of Korea (DPRK) that entails tricking builders into downloading malicious packages or seemingly innocuous video conferencing functions as a part of a coding check. It first got here to mild in November 2023.

BeaverTail Malware

This isn’t the primary time the risk actors have used npm packages to distribute BeaverTail. In August 2024, software program provide chain safety agency Phylum disclosed one other bunch of npm packages that paved the best way for the deployment of BeaverTail and a Python backdoor named InvisibleFerret.

The names of the malicious packages recognized on the time had been temp-etherscan-api, ethersscan-api, telegram-con, helmet-validate, and qq-console. One facet that is widespread to the 2 units of packages is the continued effort on the a part of the risk actors to imitate the etherscan-api package deal, signaling that the cryptocurrency sector is a persistent goal.

Cybersecurity

Then final month, Stacklok mentioned it detected a brand new wave of counterfeit packages – eslint-module-conf and eslint-scope-util – which can be designed to reap cryptocurrencies and set up persistent entry to compromised developer machines.

Palo Alto Networks Unit 42 informed The Hacker Information earlier this month the marketing campaign has confirmed to be an efficient option to distribute malware by exploiting a job seeker’s belief and urgency when making use of for alternatives on-line.

The findings spotlight how risk actors are more and more misusing the open-source software program provide chain as an assault vector to contaminate downstream targets.

“Copying and backdooring respectable npm packages continues to be a standard tactic of risk actors on this ecosystem,” Datadog mentioned. “These campaigns, together with Contagious Interview extra broadly, spotlight that particular person builders stay priceless targets for these DPRK-linked risk actors.”

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.



LEAVE A REPLY

Please enter your comment!
Please enter your name here