Network Security, Malware, Third-party code

Malware deployed via job interview-spoofing NPM packages

Python website.

Attacks deploying a malicious Python backdoor via fraudulent NPM packages spoofing as job interviews have been targeted at software developers by suspected North Korea-linked threat actors as part of the ongoing DEV#POPPER social engineering campaign, according to The Hacker News.

Threat actors impersonating employers have been delivering a GitHub-hosted ZIP archive purportedly a part of a job interview, which contains the information-stealing JavaScript file dubbed "BeaverTail" that also enables the installation of the InvisibleFerret Python backdoor, a report from Securonix showed. Such a script also features data exfiltration, remote command execution, and clipboard and keystroke logging capabilities.

"When it comes to attacks which originate through social engineering, it's critical to maintain a security-focused mindset, especially during intense and stressful situations like job interviews. The attackers behind the DEV#POPPER campaigns abuse this, knowing that the person on the other end is in a highly distracted and in a much more vulnerable state," said researchers.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds