简体中文
繁體中文
English
Pусский
日本語
ภาษาไทย
Tiếng Việt
Bahasa Indonesia
Español
हिन्दी
Filippiiniläinen
Français
Deutsch
Português
Türkçe
한국어
العربية
Abstract:The notorious North Korean cybercrime group, Lazarus, has recently intensified its infiltration into the npm ecosystem by deploying six new malicious packages. These packages are designed to compromise developer environments, steal credentials, extract cryptocurrency data, and install backdoors.
Lazarus employs a sophisticated method to infiltrate developer environments. The group creates and maintains GitHub repositories that host these malicious npm packages, giving them the appearance of legitimate open-source projects. This tactic increases the likelihood of developers inadvertently integrating harmful code into their workflows.
The six identified malicious packages are:
These packages mimic the names of widely-used libraries, employing a technique known as typosquatting to deceive developers into installing them.
Once these malicious packages are installed, they execute scripts that gather system environment details, including hostnames and operating systems. They systematically search browser profiles to locate and extract sensitive files, such as ‘Login Data’ from Chrome, Brave, and Firefox browsers, as well as keychain archives on macOS. Notably, these packages also target cryptocurrency wallets, specifically extracting ‘id.json’ from Solana and ‘exodus.wallet’ from Exodus wallets. The stolen data is then transmitted to command-and-control (C2) servers controlled by the attackers.
Identifying the exact perpetrators behind cyberattacks is inherently challenging. However, the tactics, techniques, and procedures (TTPs) observed in this npm attack closely align with those previously documented in Lazarus operations. These include the use of similar obfuscation techniques, cross-platform targeting of Windows, macOS, and Linux systems, and the deployment of multi-stage payloads to maintain prolonged access to compromised systems.
Lazarus Group has orchestrated some of the most devastating cyber heists in history, targeting cryptocurrency exchanges, blockchain networks, and financial institutions. Over the past few years, the group has been responsible for stealing billions of dollars worth of digital assets. Here are some of their most significant attacks:
Bybit Exchange Hack (2025) – $1.4 Billion Stolen
One of the biggest crypto heists to date, the Bybit attack saw Lazarus exploit security vulnerabilities to steal around $1.4 billion in Ethereum. While some of the stolen funds remain traceable, a significant portion has disappeared into untraceable wallets.
WazirX Hack (2024) – $235 Million Stolen
Lazarus was initially suspected of orchestrating the $235 million hack on Indian crypto exchange WazirX in July 2024. However, later investigations led to the arrest of a suspect in India. The attack resulted in significant financial losses and heightened concerns about exchange security.
Stake.com Hack (2023) – $41 Million Stolen
The online gambling platform Stake.com was targeted in September 2023, with Lazarus reportedly draining $41 million from the site by exploiting security weaknesses.
Axie Infinity Ronin Network Hack (2022) – $620 Million Stolen
Lazarus used social engineering tactics to gain access to the private keys of Axie Infinitys Ronin Network, draining approximately $620 million worth of crypto. This remains one of the largest DeFi exploits in history.
From large-scale exchange hacks to supply chain attacks like the recent npm infiltration, Lazarus continues to refine its methods. Their ability to adapt and develop new tactics makes them one of the most persistent threats in the cybersecurity landscape. As their attacks grow in sophistication, individuals and businesses must remain vigilant against potential vulnerabilities.
Disclaimer:
The views in this article only represent the author's personal views, and do not constitute investment advice on this platform. This platform does not guarantee the accuracy, completeness and timeliness of the information in the article, and will not be liable for any loss caused by the use of or reliance on the information in the article.
Once recognised as the Prince of Bitcoin, Sam Lee, who is also the co-founder of Hyperverse and HyperFund, is now charged with a billion-dollar fraud.
SEC sues Ronald A. Pallek for a $1.54M fraudulent scheme, alleging false promises and Ponzi-like payments to investors.
Indian authorities arrest Aleksej Besciokov, wanted by the US for running a $96B crypto exchange linked to global money laundering, cybercrime, and terrorism.
A 32-year-old accountant lost RM46,534 to the fraudulent 'Boom-S' investment scheme after being added to a Whatsapp group named PJT Academy.