Close Menu
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Trending

FG calls for stronger media literacy to combat misinformation – Punch Newspapers

April 30, 2026

FG sets agenda to tackle fake news through media literacy

April 30, 2026

Misidentified ‘edible’ mushrooms linked to a surge of ALS cases

April 30, 2026
Facebook X (Twitter) Instagram
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Subscribe
Web StatWeb Stat
Home»AI Fake News
AI Fake News

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs

News RoomBy News RoomApril 29, 2026Updated:April 30, 202613 Mins Read
Facebook Twitter Pinterest WhatsApp Telegram Email LinkedIn Tumblr

Here’s a humanized summary of the provided cybersecurity content, broken down into six paragraphs and aiming for approximately 2000 words (please note, reaching 2000 words with genuine humanization would require a significant amount of creative expansion and contextual storytelling, but I will provide a comprehensive and engaging narrative within the limits of a practical summary):


Paragraph 1: The Digital Serpent in Our Gardens – The Tale of PromptMink and a Deceptive Dependency

Imagine a world where the beautiful, intricate gardens of our digital lives, filled with innovative AI and bustling open-source communities, are subtly infiltrated by a hidden serpent. This isn’t a story from a fantasy novel, but a stark reality unfolding in the realm of cybersecurity. Our tale begins with a discovery by vigilant researchers: a seemingly innocuous garden utility, an npm package named “@validate-sdk/v2,” was not what it appeared to be. On the surface, it promised helpful tools for digital gardeners – things like hashing and validation, the very foundation of secure digital practices. But lurking beneath this benign facade was a sinister intent: to slither in and steal the most precious seeds of our digital existence – our sensitive secrets. What makes this particular serpent even more unsettling is its origin. There are strong whispers, almost certainties, that this malicious code was “vibe-coded,” perhaps even partly generated by a large language model (LLM) like Anthropic’s Claude Opus. This isn’t a direct accusation against the AI itself, but rather a chilling realization that even the tools designed to empower us can be twisted by malicious hands. This particular digital serpent, codenamed “PromptMink” by the security wizards at ReversingLabs, wasn’t acting alone. It was a cunning pawn in a much larger, more elaborate game, orchestrated by a sophisticated and persistent North Korean threat actor known by various shadowy monikers: Famous Chollima, Shifty Corsair, and the puppet master behind long-running campaigns like “Contagious Interview” and the “IT Worker” scam. They are the seasoned gardeners of digital deception, always seeking new ways to plant their poisonous seeds. This particular seed was first sown into the digital landscape in October 2025, a silent intruder waiting for its moment to bloom.

Paragraph 2: The Unseen Roots and the AI’s Unwitting Hand – A Chain of Compromise

The true cunning of PromptMink lies in its ability to embed itself deep within the digital ecosystem, much like a parasitic plant that latches onto a host. ReversingLabs researcher Vladimir Pezo described how this tainted package was subtly introduced in a commit on February 28th, becoming a dependency for an autonomous trading agent. The unsettling twist? This crucial commit, this moment of infection, was “co-authored” by Anthropic’s Claude Opus, the very AI designed to assist and innovate. This isn’t to say Claude Opus intentionally created malware, but rather that its output, when guided by malicious queries, can be weaponized. It’s a sobering reminder that even with advanced AI, human oversight and rigorous security practices are paramount. The danger, as Pezo highlighted, was immediate and severe: access to users’ crypto wallets and the precious digital funds they contained. The insidious nature of this attack extended its reach, creating a tangled web of dependencies. “@validate-sdk/v2” wasn’t directly accessed by the victims. Instead, it was a hidden layer, a dependency for another npm package called “@solana-launchpad/sdk.” This “@solana-launchpad/sdk” then served as a critical component for a third package, “openpaw-graveyard.” This “openpaw-graveyard” was designed to be an “autonomous AI agent” – a sophisticated digital entity that could build a social identity on the Solana blockchain, trade cryptocurrency, and interact with other agents. Imagine a digital avatar designed to navigate the complexities of crypto, unwittingly carrying a hidden viper in its code. ReversingLabs’ investigation revealed that this AI-agent-generated package was added in a source code commit in February 2026. The moment this commit went live, the agent package executed the malicious code, granting the attackers unauthorized access to victims’ cryptocurrency wallets and funds through leaked credentials. It was a perfectly orchestrated trap, designed to exploit the very trust placed in new, innovative technologies. The beauty of this attack, from the attacker’s perspective, lay in its phased approach. The initial packages, the first layer of deception, were entirely benign. They were simply bait. It was only when these seemingly harmless packages imported the second-layer packages that the true, nefarious functionality became active. This layered strategy served a crucial purpose: to evade detection. If one layer was exposed or removed, another was swiftly ready to take its place, ensuring the continued success of the campaign.

Paragraph 3: Deceptive Footprints and the Art of Digital Camouflage – Evolving Tactics and Persistent Threats

The digital battlefield is a constant game of cat and mouse, and Famous Chollima, the North Korean threat actor, proved to be a master of camouflage. The researchers identified several first-layer packages, seemingly innocent utilities related to cryptocurrencies, like “@solana-launchpad/sdk,” “@meme-sdk/trade,” and “@pumpfun-ipfs/sdk.” These packages, ReversingLabs explained, listed numerous dependencies, many of them incredibly popular npm packages with millions or even billions of downloads, such as “axios” or “bn.js.” This was a brilliant move – blending in with the crowd, hiding in plain sight. But within this vast network of legitimate dependencies, a small, critical number were the malicious second-layer packages, the true carriers of the digital venom. To avoid detection, these rogue packages employed sophisticated techniques. One tactic involved creating malicious versions of functions already present in popular, legitimate packages. Imagine a seemingly genuine key that, when used, not only opens a door but also subtly copies itself for a thief. Another common strategy was typosquatting, where the malicious packages mimicked the names and descriptions of legitimate libraries, hoping to trick unsuspecting developers into downloading them. The campaign’s origins stretched back to September 2025, when “@hash-validator/v2” was first uploaded to the npm registry. This decision to split the cryptocurrency stealer into two parts – a benign “bait” package that would then download the actual malware – was a calculated move to evade detection and mask the true scale of their operation. It was a digital “Trojan horse” designed to slip past automated defenses and human scrutiny. This wasn’t the first time such activities had been noted. Just two months later, JFrog documented similar tactics, highlighting the threat actor’s use of transitive dependencies (dependencies of dependencies) to execute malicious code and siphon valuable data from developer systems. Over the intervening months, this campaign demonstrated remarkable adaptability, undergoing several transformations. It even spread its tendrils to the Python Package Index (PyPI) by pushing a malicious package called “scraper-npm” in February 2026, showcasing the same core functionality. More recently, the threat actors have been observed establishing persistent remote access via SSH and using sophisticated Rust-compiled payloads to exfiltrate entire projects, complete with source code and intellectual property, from compromised systems. This evolution from simple information stealers to highly specialized, multi-platform harvesters capable of dropping backdoors and stealing entire intellectual property demonstrates the relentless ambition of these North Korean threat actors in targeting the open-source ecosystem, particularly developers in the Web3 space. As ReversingLabs aptly put it, they are “leveraging AI-generated code and a layered package strategy to evade detection and more effectively deceive automated coding assistants than human developers.”

Paragraph 4: The Spider’s Web: Contagious Trader and the Maturing Malware Toolkit

The digital spider weaving this web of deceit, Famous Chollima, continued to evolve its tactics, revealing new facets of its malicious campaigns. Alongside PromptMink, researchers unveiled further connections to the “Contagious Interview” campaign through the discovery of a malicious npm package named “express-session-js.” This package served as a sinister conduit, acting as a “dropper” that fetched a second-stage, heavily obfuscated payload from JSON Keeper, a paste service. SaftDep’s analysis painted a grim picture: static deobfuscation of this stage-2 payload revealed a full-fledged Remote Access Trojan (RAT) and information stealer. This wasn’t merely about stealing a few credentials; it was about seizing complete control. The RAT connected to a specific IP address (216[.]126[.]237[.]71) via Socket.IO, a legitimate communication library, and boasted a terrifying array of capabilities: theft of browser credentials, extraction of cryptocurrency wallets, capturing screenshots of the victim’s screen, monitoring clipboard activity, logging every keystroke, and even remotely controlling the mouse and keyboard. What made this particularly intriguing were the overlaps with “OtterCookie,” another known stealer malware attributed to the same campaign. Both utilized legitimate packages like “socket.io-client,” “screenshot-desktop,” and “clipboardy” for their nefarious purposes. The novel addition this time was the integration of “@nut-tree-fork/nut-js” for mouse and keyboard control, signaling a clear intent to upgrade the RAT’s capabilities to facilitate interactive control of infected hosts – essentially, an attacker sitting at your computer, undetected. OtterCookie itself had matured, finding new distribution channels beyond malicious npm packages like “gemini-ai-checker” or “chai-extensions-extras.” It was also being spread via a trojanized open-source 3D chess project hosted on Bitbucket, highlighting the diversity of the infection vectors. A third method, dubbed “Contagious Trader,” adopted a “Matryoshka Doll” approach, where a seemingly benign wrapper package like “bjs-biginteger” would download a malicious dependency (“bjs-lint-builder”), eventually leading to the installation of the final stealer. BlueVoyant researcher Curt Buchanan emphasized the escalating threat, noting the “rapid evolution, from static Obfuscator.io encoding to dynamically rotating custom obfuscation, and their abuse of Vercel-hosted C2 infrastructure,” all demonstrating a maturation in their operational capabilities. The connections between “Contagious Interview,” “Contagious Trader,” and “graphalgo” paint a picture of a multifront, highly coordinated cyber warfare conducted by Shifty Corsair.

Paragraph 5: The Master of Deception: Graphalgo, Fake Companies, and False Promises

Beyond the technical sophistication, the North Korean threat actors demonstrated an alarming mastery of social engineering, creating elaborate traps to ensnare their victims. This was starkly evident in the “graphalgo” campaign, where developers were lured with the irresistible bait of fake companies and seemingly legitimate job opportunities. It played out like a sinister theatrical production: the hackers used job-seeking platforms and social networks to pose as recruiters from these fabricated companies. They would engage prospective targets, inviting them to participate in “coding tests” or “assessments.” These assessments involved downloading GitHub-hosted projects, which, unbeknownst to the developers, contained a hidden dependency to a malicious package published on npm or PyPI. The ultimate goal? To deploy a Remote Access Trojan (RAT) on their systems. To make these illusions convincing, the operators meticulously crafted a network of fake companies, complete with credible profiles on platforms like GitHub, LinkedIn, and X (formerly Twitter). This carefully constructed veneer of legitimacy was designed to disarm suspicion. In an astonishing display of their commitment to deception, the attackers even went to the extent of legally registering a limited liability corporation (LLC) in Florida, USA, under the name “Blocmerce” in August 2025. This wasn’t just online fakery; it was a tangible, legal fabrication. Other names used for these elaborate phishing fronts included Veltrix Capital and Bridgers Finance. ReversingLabs security researcher Karlo Zanki explained that these organizations would link to several GitHub organizations related to blockchain companies, active since June 2025, specifically to “provide trustworthiness to fake job offerings and to host fake job interview tasks.” In more recent iterations of this campaign, the attackers introduced another layer of stealth. Instead of directly publishing the malicious dependencies to public registries like npm or PyPI, they hosted them as “release artifacts” in GitHub repositories. This maneuver was a deliberate attempt to minimize the risk of detection by avoiding the scrutiny that public package registries often entail. The malicious dependency’s reference was cleverly buried deep within the list of transitive dependencies. The package-lock.json file, which instructs package managers where to fetch specific dependencies, was manipulated. While most dependencies were fetched from the official npm registry, the malicious one was discreetly fetched directly from a crafted GitHub repository release artifact. Packages like “graph-dynamic,” “graphbase-js,” and “graphlib-js” were the initial npm vehicles. The culmination of this intricate attack was the deployment of a powerful RAT, capable of gathering extensive system information, enumerating files and directories, listing running processes, creating and manipulating folders and files, and, most critically, uploading and downloading files – a complete takeover of the victim’s digital environment.

Paragraph 6: The Unrelenting Assault on Open-Source and The Cost of Deception

The relentless assault by North Korean state-sponsored threat actors on the open-source ecosystem escalated further with the compromise of “axios,” one of the most widely used npm packages globally. This incident, linked to a threat cluster tracked as UNC1069, underscores the persistent and pervasive danger posed by Pyongyang. Following this breach, the attackers published a new npm package, “csec-crypto-utils,” containing an “updated payload.” This payload substituted the RAT dropper with a sophisticated data stealer, specifically designed to exfiltrate critical assets like AWS keys, GitHub tokens, and sensitive .npmrc configuration files to an external server (“csec-c2-server.onrender[.]com”). Hunt.io’s report, detailing this supply chain compromise, connected the attack to a sub-cluster of the notorious Lazarus Group known as BlueNoroff. This attribution was based on strong infrastructure overlaps and the striking similarities between the newly deployed RAT and “NukeSped,” a previously identified malware. ReversingLabs delivered a stark warning about the sheer dangerousness of these operations: “The threat actors’ use of advanced techniques and tactics, as well as an astonishing level of campaign preparation (setting up a Florida LLC) and their ability to adapt, makes North Korean threat actors a top threat to organizations or individual developers focused on cryptocurrency.” This isn’t just about financial gain; it’s about state-sponsored espionage, intellectual property theft, and destabilizing the global digital economy. The human impact of such sophisticated attacks is profound. For individual developers, it can mean the loss of their life’s work – source code, intellectual property, and precious cryptocurrency holdings. Their trust in the open-source community, a cornerstone of modern software development, is shattered. For organizations, it can lead to massive financial losses, reputational damage, and a fundamental breach of security that compromises customers and critical systems. The irony of using AI to “vibe-code” malicious packages, of hiding within the very fabric of open-source collaboration, and of targeting individuals offering their skills in the digital economy is not lost. This story serves as a crucial reminder for every digital gardener, every developer, and every organization: vigilance is paramount. We must not only secure our digital homes but also question the very seeds we plant in our gardens, especially when they come from shadowy sources, no matter how appealing or legitimate they may appear. The digital serpent is cunning, but with collective awareness and robust security, we can strive to keep our gardens safe and our digital future secure.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
News Room
  • Website

Keep Reading

While deepfake sex crimes and fake news using artificial intelligence (AI) technology have emerged a..

‘AI Hallucinations’ Used By NJ Lawyer To Create Fake Citations, Judge Says

Dwayne ‘The Rock’ Johnson’s wife Lauren Hashian hits out at AI-generated baby announcement pictures

Amazon blocked millions of fake products, reviews using AI: new report – CTV News

South Africa Withdraws AI Policy Over Fake AI-Generated Sources – 2oceansvibe News

Dwayne Johnson’s Wife Lauren Hashian Shuts Down Rumors She Welcomed Another Baby After AI Photos Go Viral

Editors Picks

FG sets agenda to tackle fake news through media literacy

April 30, 2026

Misidentified ‘edible’ mushrooms linked to a surge of ALS cases

April 30, 2026

Nigeria Promotes Media Literacy to Combat Misinformation

April 30, 2026

Disinformation in the Future

April 30, 2026

Tolashe blames former spokesperson for ‘misinformation campaign’ amid mounting scandals

April 30, 2026

Latest Articles

Chronicle Med/Sci: Once again, Croton’s leading blog disseminates Covid vaccine disinformation.

April 30, 2026

Pressed on Pentagon purge, Hegseth pushes false claim about Obama-era firings

April 30, 2026

Tolashe blames Lumka Oliphant for ‘coordinated misinformation campaign’ against her

April 30, 2026

Subscribe to News

Get the latest news and updates directly to your inbox.

Facebook X (Twitter) Pinterest TikTok Instagram
Copyright © 2026 Web Stat. All Rights Reserved.
  • Privacy Policy
  • Terms
  • Contact

Type above and press Enter to search. Press Esc to cancel.