North Korean hackers target open-source repositories in new espionage campaign
朝鲜支持的黑客组织Lazarus通过上传伪装成合法工具的恶意包至npm和PyPI仓库,窃取开发者凭证和设备信息,并植入后门。该行动已影响超3.6万名开发者。攻击者利用供应链漏洞及拼写欺骗等手法诱骗下载,并部署间谍工具以实现长期网络渗透。 2025-7-31 14:46:9 Author: therecord.media(查看原文) 阅读量:17 收藏

North Korean state-backed hackers have planted malicious code in open-source software repositories as part of an ongoing campaign that has already put tens of thousands of developers at risk of surveillance and data theft, according to new research.

Between January and July, cybersecurity firm Sonatype said it blocked 234 malicious packages uploaded to the widely used npm and PyPI code repositories and linked to the campaign. The packages, which impersonated legitimate developer tools, were designed to steal credentials, profile victims’ devices and plant backdoors. The researchers estimate the campaign may have impacted more than 36,000 developers.

In its latest operation, Lazarus took advantage of major gaps in the open-source software supply chain — like developers depending on unvetted packages and the lack of oversight for popular tools that are often maintained by just one or two people. Many of the malicious packages used typosquatting and brand impersonation tactics, mimicking well-known libraries or company tools to fool developers and automated systems into downloading them.

Once installed, the malicious packages deploy a range of spying tools — including a clipboard stealer, keylogger, screenshot utility and credential harvester. More than 90 of the packages were built to steal secrets and credentials, while over 120 served as droppers to deliver additional malware, suggesting a broader strategy focused on long-term network infiltration and persistence, rather than quick financial gain, researchers said.

The campaign reflects an evolution in tactics by Lazarus, a North Korean state-backed hacking group that has been linked to the world’s largest cryptocurrency heists, including a $1.4 billion theft from Dubai-based Bybit earlier this year. While historically focused on financial theft, Lazarus has shifted its operations toward espionage and covert access to critical infrastructure, Sonatype said.

The latest operation appears to have specifically targeted developers in DevOps and CI/CD-heavy environments. Although attribution in cyber operations is often inconclusive, researchers said the infrastructure and tactics closely mirror previous Lazarus-linked campaigns.

Malicious actors are increasingly exploiting open-source repositories for financial gain or espionage. In July, hackers compromised a popular npm package by phishing its maintainer via a fake login page, allowing them to publish a backdoored version of code used in millions of projects. Around the same time, PyPI warned users about a separate phishing campaign using a spoofed website to harvest developer credentials. The campaigns have not been attributed to any specific threat actor.

“Lazarus is turning open source ecosystems into sophisticated delivery mechanisms for cyberespionage,” Sonatype said about the latest campaign, adding that such attacks are “a clear signal that the trust inherent in the open source community is being actively exploited for geopolitical gain.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/north-korean-hackers-targeting-open-source-repositories
如有侵权请联系:admin#unsafe.sh