Close Menu
  • Home
  • Articles
    • Attacks
      • BEC
      • Data Breach
      • DDoS
      • Evasion Attacks
      • Injection
      • Malware
      • MITM
      • Phishing
      • Ransomware
      • RCE
      • Social Engineering
      • Spoofing
      • Spyware
    • Business and Policy
      • BCP and DRP
      • GRC
      • Regulations
    • Data Protection
      • DLP
      • DRM
      • Encryption
      • IAM
    • Future, Trends and Insight
      • AI
      • Events & Community
      • Emerging Tech
      • Interviews With Experts
      • Insights
      • Study & Research
    • Resources
      • Guides
      • Tools
      • Training & Education
    • Security
      • API
      • Apps
      • Cloud
      • Critical Infrastructure
      • Endpoint
      • Hardware
      • IoT
      • Mobile
      • Network
      • OT
      • Port Security
      • Security Architecture
      • Software Development
      • Supply Chain
      • Zero Trust
    • Threats and Vulnerabilities
      • Emerging Threats
      • Insider Threats
      • Risk Management
      • Threat Intelligence
      • Zero Day
  • News and Exclusives
    • Latest News
    • ISB Exclusive
    • Positive News
  • Who We Are
    • About Us
    • Write for Us
    • Media Pack
  • Contact Us
Facebook X (Twitter) LinkedIn
Facebook X (Twitter) LinkedIn
Information Security BuzzInformation Security Buzz
  • Home
  • Articles
    • Attacks
      • BEC
      • Data Breach
      • DDoS
      • Evasion Attacks
      • Injection
      • Malware
      • MITM
      • Phishing
      • Ransomware
      • RCE
      • Social Engineering
      • Spoofing
      • Spyware
    • Business and Policy
      • BCP and DRP
      • GRC
      • Regulations
    • Data Protection
      • DLP
      • DRM
      • Encryption
      • IAM
    • Future, Trends and Insight
      • AI
      • Events & Community
      • Emerging Tech
      • Interviews With Experts
      • Insights
      • Study & Research
    • Resources
      • Guides
      • Tools
      • Training & Education
    • Security
      • API
      • Apps
      • Cloud
      • Critical Infrastructure
      • Endpoint
      • Hardware
      • IoT
      • Mobile
      • Network
      • OT
      • Port Security
      • Security Architecture
      • Software Development
      • Supply Chain
      • Zero Trust
    • Threats and Vulnerabilities
      • Emerging Threats
      • Insider Threats
      • Risk Management
      • Threat Intelligence
      • Zero Day
  • News and Exclusives
    • Latest News
    • ISB Exclusive
    • Positive News
  • Who We Are
    • About Us
    • Write for Us
    • Media Pack
  • Contact Us
Subscribe
Information Security BuzzInformation Security Buzz
Home - Attacks - Malware - Malicious npm Packages Found to Distribute BeaverTail Malware
Malware Attacks Latest News News & Analysis Threat Intelligence

Malicious npm Packages Found to Distribute BeaverTail Malware

ISB Staff ReporterBy ISB Staff ReporterOctober 29, 2024Updated:October 29, 20243 Mins Read
Share LinkedIn Twitter Facebook Copy Link Email
beaver tail
Share
Facebook Twitter LinkedIn Email Copy Link

Three malicious packages uploaded to the npm registry were discovered to harbor BeaverTail, a JavaScript downloader and information stealer associated with a continuing North Korean campaign known as Contagious Interview.

The packages—passports-js, bcrypts-js, and blockscan-api collectively amassed 323 downloads, and have been linked to threat actors from the Democratic People’s Republic of Korea (DPRK), also known as North Korea.

According to a report from Palo Alto Networks’ Unit 42, the BeaverTail malware is associated with an ongoing cyber campaign dubbed Contagious Interview, which specifically targets job-seekers in the U.S. tech industry. In this scheme, victims are lured into participating in fictitious job interviews where the malware is delivered disguised as part of an interview task.

Datadog Security Research has attributed the identified samples to a single threat actor designated as “Tenacious Pungsan.” The name references the Pungsan dog, native to North Korea, to symbolize the nation-state threat actor cluster involved.

Increasing Concerns Over Open-Source Software Security

The findings highlight a growing concern over the security of the open-source software supply chain. Attackers increasingly exploit this landscape to compromise legitimate packages or publish new ones that harbor malicious code. In many cases, they employ namesquatting, a tactic where malicious package names closely resemble legitimate ones to confuse developers.

Datadog Security Research actively monitors the npm and PyPI ecosystems for ongoing software supply chain attacks, utilizing a command-line scanner named GuardDog. This tool has helped catalog over 1,700 malicious packages in the past two years.

Discovery Timeline

The alarming trend began in September 2024, when versions 0.7.0 and 0.7.1 of passports-js were flagged for manual review due to suspicious obfuscated JavaScript code. This code was found in an otherwise benign source file and appeared to be a backdoored version of the legitimate passport package, a widely used authentication framework for Express applications.

Subsequently, it was discovered that bcrypts-js was similarly a backdoored copy of the popular bcryptjs library. Notably, both passports-js and bcrypts-js contained identical obfuscated lines of code.

Two days later, blockscan-api was flagged for similar issues, revealing another obfuscated backdoored version of the legitimate etherscan-api, which provides an interface to the Etherscan API.

Despite the quick removal of passports-js and bcrypts-js, which occurred shortly after the initial discovery, blockscan-api and its associated user account remained active until 9 October 2024. Passports-js, bcrypts-js, and blockscan-api were downloaded 118, 81, and at least 124 times, respectively.

BeaverTail Malware Characteristics

Analysis revealed that the obfuscated malware contained in these packages is a variant of the BeaverTail malware family, which is known to target sensitive information, including cryptocurrency wallet data and credit card information stored in browser caches. BeaverTail was first identified by Palo Alto Networks’ Unit 42 in late 2023 and is used by DPRK-linked actors as part of the Contagious Interview campaign.

The malware’s obfuscation technique involves altering the code to conceal its true purpose, complicating automated analysis and detection. Datadog found that the malicious packages shared significant code behaviors and communication patterns with previously reported BeaverTail samples.

About the Author

  • isb staff reporter
    ISB Staff Reporter

The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.

Share. Facebook Twitter LinkedIn Email Copy Link

Related Posts

Cyware and ECS Partner to Enhance Government Cybersecurity with Advanced Threat Intel Exchange

October 29, 20242 Mins Read

Combatting Human Error: How to Safeguard Your Business Against Costly Data Breaches

October 29, 20246 Mins Read

Enhancing Email Security: The Pivotal Role of AI in Defending Against Evolving Cyber Threats

October 28, 20244 Mins Read
Bora Banner
 
Tripwire Banner
Black ISB Logo

Information Security Buzz is an independent resource that provides the experts’ comments, analysis, and opinion on the latest Cybersecurity news and topics

X (Twitter) LinkedIn Facebook RSS

Working With Us

  • About Us
  • Advertise With Us
  • Contact Us

Write For Us

  • How To Contribute

The Pages

  • Privacy Policy
  • Cookie Policy
  • AI Policy
  • Terms & Conditions
  • Copyright Notice

Information Security Buzz and all its contents are copyright © 2014-2024. All rights reserved. All third-party trademarks are recognized.

Type above and press Enter to search. Press Esc to cancel.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}