- One of the best earbuds I've tested for outdoor listening is on sale
- SAP aims to unify data for AI, analytics with new Business Data Cloud
- Your next Apple Watch or AirPods could have life-changing features thanks to this new initiative
- This SSD docking station is one of the best investments I've made for my iMac - here's why
- These $50 earbuds are some of the most comfortable I've tested - and they're impressively loud
North Korea Targets Crypto Devs Through NPM Packages
![North Korea Targets Crypto Devs Through NPM Packages North Korea Targets Crypto Devs Through NPM Packages](https://assets.infosecurity-magazine.com/webpage/og/bdc275e8-33de-4e5f-9988-2003ca6f4f31.jpg)
Researchers have uncovered a highly sophisticated North Korean campaign to covertly distribute crypto-stealing malware via open source components.
SecurityScorecard said in a blog post published this morning that it suspects the infamous Lazarus Group of being behind the live campaign, dubbed Operation Marstech Mayhem. It has already claimed over 230 victims in the US, Europe and Asia.
It traced a new “Marstech1” implant back to the “SuccessFriend” GitHub profile, which has been committing malicious as well as genuine software to the developer platform since July 2024.
However, SecurityScorecard claimed the same actor is also spreading the malware via npm packages, which are popular among crypto and Web3 project developers.
Marstech1 scans systems for MetaMask, Exodus and Atomic wallets, modifying browser configuration files to inject silent payloads that can intercept transactions, SecurityScorecard said.
The risk is that developers may include it in legitimate software, thereby posing a risk to potentially millions of downstream users.
This is made more likely by the various efforts Lazarus has gone to in order to avoid static and dynamic analysis of Marstech1, including Base85 encoding and XOR decryption.
These techniques are slightly different to a previous iteration of the malicious JavaScript, which were observed in two attacks in late 2024 and Jan 2025.
This latest iteration used other techniques to ensure the malware would go unnoticed and slip into the software supply chain, including:
- Control flow flattening and self-invoking functions
- Random variable and function names
- Base64 string encoding
- Anti-debugging (anti-tampering checks)
- Splitting and recombining strings
Lazarus Adapts Operations
In a sign of its growing sophistication, Lazarus Group is also adapting its infrastructure to throw security researchers off the scent.
The group is now using port 3000 for command-and-control (C2) communications, instead of ports 1224 and 1245, and is using Node.js Express backends instead of React-based control panels to, the report noted.
“Operation Marstech Mayhem exposes a critical evolution in the Lazarus Group’s supply chain attacks, demonstrating not only their commitment to operational stealth but also significant adaptability in implant development,” said SecurityScorecard SVP of threat research and intelligence, Ryan Sherstobitoff.
“It serves as a stark reminder that the landscape of cyber-threats is rapidly evolving. It is imperative for organizations and developers to adopt proactive security measures, continuously monitor supply chain activities and integrate advanced threat intelligence solutions to mitigate the risk of sophisticated implant-based attacks orchestrated by threat actors like the Lazarus Group.”