7 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
The article details a sophisticated malware operation by North Korean threat actors using npm packages to deliver malicious code. It explains how they utilize GitHub and Vercel to manage and deploy payloads, highlighting various tactics for data theft, including clipboard access, keylogging, and file exfiltration.
If you do, here's more
North Korean threat actors have set up a sophisticated infrastructure leveraging GitHub and Vercel to deploy malicious npm packages. The key repository, `stardev0914/tetrismic`, serves as a staging server that delivers harmful payloads using a Node.js process. When a victim installs one of the compromised npm packages, it extracts a JavaScript payload from a JSON response and executes it. This design allows attackers to rotate payloads easily and customize responses while keeping their command and control (C2) operations discreet until activation.
Once the malware is running, it engages in extensive data theft through multiple asynchronous processes. It can access clipboard contents, collect browser credentials, log keystrokes, capture screenshots, and scan the filesystem for sensitive information. The malware is specifically programmed to look for files related to wallets, recovery phrases, and other confidential data, then exfiltrates this information to a designated server. The use of `child_process.spawn` ensures that these tasks continue running in the background, even after the initial loader has finished executing.
A critical component of the operation is the `node-tailwind` npm package, which has been backdoored. Instead of using a legitimate utility, the malicious package is integrated into a helper function in the codebase, ensuring that it runs whenever the application is built. This method of embedding malicious code makes detection challenging, as it blends into normal application behavior. The attackers have structured their operation to maintain flexibility and stealth, which poses significant risks to any developers unwittingly using these compromised packages.
Questions about this article
No questions yet.