North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages
In a chilling continuation of the Contagious Interview campaign, North Korean state-sponsored threat actors are actively exploiting the npm ecosystem, using it as a delivery channel for the BeaverTail malware and a new Remote Access Trojan (RAT) loader. This campaign is attributed to the Lazarus Group, a well-known advanced persistent threat (APT) group.
The Malicious Packages
Security researcher Kirill Boychenko from Socket reports that these packages use hexadecimal string encoding to evade detection by automated scanners and manual reviewers.
Here are the 11 malicious packages, downloaded over 5,600 times before takedown:
Some of these packages—like events-utils and icloud-cod—were linked to Bitbucket repositories (instead of GitHub), showcasing how the attackers are expanding their reach across multiple platforms. The icloud-cod package was found hosted inside a folder named "eiwork_hire", reiterating the recruitment-themed social engineering tactic.
Malware Capabilities
These packages contain loaders capable of:
Tropidoor allows attackers to:
Attack Pattern
The malware campaign exploits the trust developers place in npm. Attackers pose as recruiters and lure victims into cloning infected projects from Bitbucket. These are disguised as legitimate job application tasks and contain the malicious BeaverTail in configuration files (tailwind.config.js) and DLL downloaders.
Defence Strategies for Developers and Organizations
Recommended by LinkedIn
1. Audit Your Dependencies
2. Limit Remote Code Execution
3. Educate Teams
4. Code Review & Pen Testing
5. Isolate Build Environments
Prevent infected packages from spreading by isolating CI/CD pipelines from production assets.
About Indian Cyber Security Solutions (ICSS)
Indian Cyber Security Solutions (ICSS) is your trusted partner in building a safer digital future. We specialize in delivering advanced cybersecurity solutions designed to protect businesses from the ground up.
With our AI-powered platform SAVE and expert-led VAPT services, we help organizations detect vulnerabilities before attackers do, minimize risks, and maintain compliance with confidence.
At ICSS, we go beyond just securing systems — we empower teams, fortify infrastructures, and future-proof your digital environment.
At ICSS, we believe in not just protecting businesses—but preparing them for the future.
Ready to protect your digital future?
Explore our services at 👉 indiancybersecuritysolutions.com