Network Security, Malware, Third-party code

Malware deployed via job interview-spoofing NPM packages

Share
Python website.

Attacks deploying a malicious Python backdoor via fraudulent NPM packages spoofing as job interviews have been targeted at software developers by suspected North Korea-linked threat actors as part of the ongoing DEV#POPPER social engineering campaign, according to The Hacker News.

Threat actors impersonating employers have been delivering a GitHub-hosted ZIP archive purportedly a part of a job interview, which contains the information-stealing JavaScript file dubbed "BeaverTail" that also enables the installation of the InvisibleFerret Python backdoor, a report from Securonix showed. Such a script also features data exfiltration, remote command execution, and clipboard and keystroke logging capabilities.

"When it comes to attacks which originate through social engineering, it's critical to maintain a security-focused mindset, especially during intense and stressful situations like job interviews. The attackers behind the DEV#POPPER campaigns abuse this, knowing that the person on the other end is in a highly distracted and in a much more vulnerable state," said researchers.

Malware deployed via job interview-spoofing NPM packages

Attacks deploying a malicious Python backdoor via fraudulent NPM packages spoofing as job interviews have been targeted at software developers by suspected North Korea-linked threat actors as part of the ongoing DEV#POPPER social engineering campaign, according to The Hacker News.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.