Skip to content

Top Stories

Top Stories

Primary Menu
  • Breaking News
  • UNIT CONVERTER
  • QR Code Generator
  • SEO META TAG GENERATOR
  • Background Remover Tool
  • Image Enhancer Tool
  • Image Converter Tool
  • Image Compressor Tool
  • Keyword Research Tool
  • Paint Tool
  • About Us
  • Contact Us
  • Privacy Policy
HOME PAGE
  • Home
  • Uncategorized
  • North Korean Hackers Exploit 67 Malicious npm Packages to Spread XORIndex Malware
  • Uncategorized

North Korean Hackers Exploit 67 Malicious npm Packages to Spread XORIndex Malware

VedVision HeadLines July 15, 2025
North Korean Hackers Exploit 67 Malicious npm Packages to Spread XORIndex Malware


The Socket Threat Research Team has discovered a new software supply chain attack that uses a malware loader called XORIndex that had not been previously reported, marking a major uptick in North Korean cyber operations.

This activity builds on the Contagious Interview campaign previously detailed in June 2025, which involved the HexEval Loader.

The adversaries, attributed to North Korean state-backed actors, infiltrated the npm registry with 67 malicious packages, amassing over 17,000 downloads collectively.

Of these, 27 packages remain active, prompting immediate takedown requests to npm’s security team and account suspensions.

Contagious Interview Campaign

The campaign exhibits a persistent “whack-a-mole” pattern, where detections lead to rapid uploads of new variants using evolved tactics.

Operating in parallel, the XORIndex campaign has garnered more than 9,000 downloads between June and July 2025, while HexEval continues with over 8,000 additional downloads.

XORIndex Malware
XORIndex Loader variant

These loaders target developers, job seekers, and cryptocurrency holders, aiming to exfiltrate sensitive credentials and wallet data through a chain of malware stages.

The XORIndex Loader, named for its XOR-encoded strings and index-based obfuscation, mirrors HexEval in functionality by collecting host metadata such as hostname, username, external IP, geolocation, and platform before decoding and executing follow-on scripts.

It fetches the second-stage BeaverTail malware from hardcoded C2 endpoints, which in turn deploys the third-stage InvisibleFerret backdoor.

BeaverTail scans for nearly 50 wallet directories and browser extension paths, including MetaMask, Phantom, and TronLink, archiving sensitive files like keychains and JSON seed data into a temporary ZIP file for exfiltration to IP-based HTTP servers.

This platform-agnostic malware operates across Windows, macOS, and Linux within the Node.js ecosystem, emphasizing remote code execution via eval() for payload delivery.

The campaign’s timeline reveals waves of deployments from April to July 2025, with 39 new HexEval packages and 28 XORIndex variants in the latest surge.

Technical Analysis of XORIndex

Tracing XORIndex’s development reveals a rapid progression from prototypes to sophisticated loaders.

XORIndex Malware
obfuscated code in the cronek package.

Early versions, like postcss-preloader, lacked obfuscation and reconnaissance, focusing solely on beaconing to C2 for remote code execution.

Transitional variants, such as js-log-print, introduced buggy host profiling, while dev-filterjs added ASCII buffer-based string obfuscation using TextDecoder.

Mature iterations incorporate XOR decoding, multi-endpoint rotation across Vercel-hosted /api/ipcheck paths, and dual eval() paths for primary and secondary payloads.

Shared infrastructure, including endpoints like https://soc-log[.]vercel[.]app/api/ipcheck and 144[.]217[.]86[.]88, links XORIndex to prior Contagious Interview operations, underscoring the actors’ investment in resilient supply chain attacks.

According to Socket Report, this evolution highlights increasing evasion techniques, such as memory-only execution and modular designs, complicating detection.

Defenders face ongoing threats as actors diversify npm aliases, reuse malware like BeaverTail, and target high-value individuals in DevOps and open-source communities.

Recommendations include real-time scanning tools like Socket’s GitHub App and CLI to intercept malicious dependencies during installation or merges, alongside browser extensions for pre-install risk assessment.

As North Korean operations persist, proactive supply chain defenses are essential to mitigate these financially motivated, state-sponsored intrusions.

Indicators of Compromise (IOCs)

Category Details
Malicious npm Packages XORIndex: 28 pkgs (e.g., vite-meta-plugin, eth-auditlog, cronek); HexEval: 39 pkgs (e.g., nextjs-https-supertest, jsonslicer, node-mongo-orm)
npm Aliases XORIndex: 18 aliases (e.g., h96452582, devin-ta39, jasonharry1988); HexEval: 29 aliases (e.g., denniswinter, jinping, oleksandr522)
Email Addresses XORIndex: 15 emails (e.g., h96452582@gmail[.]com, devin.s@gedu[.]demo[.]ta-39[.]com); HexEval: 29 emails (e.g., denniswinter727@outlook[.]com, jinping0821@outlook[.]com)
C2 Endpoints https://soc-log[.]vercel[.]app/api/ipcheck, https://1215[.]vercel[.]app/api/ipcheck, https://log-writter[.]vercel[.]app/api/ipcheck, https://process-log-update[.]vercel[.]app/api/ipcheck, https://api[.]npoint[.]io/1f901a22daea7694face, 144[.]217[.]86[.]88

Stay Updated on Daily Cybersecurity News. Follow us on Google News, LinkedIn, and X.



Source link

Continue Reading

Previous: Solana Target Price Of $200 In July Wavering As SOL Drops 4% Overnight
Next: ETH Price Rally To $3.4K On Traders’ Radar, Here’s Why

Related News

Dark Partners Hacker Group Drains Crypto Wallets Using Fake AI Tools and VPN Services
  • Uncategorized

Dark Partners Hacker Group Drains Crypto Wallets Using Fake AI Tools and VPN Services

VedVision HeadLines July 16, 2025
Q2 Beats & Bullish Forecast
  • Uncategorized

Q2 Beats & Bullish Forecast

VedVision HeadLines July 16, 2025
This Bitcoin Thesis ‘Will Retire Your Bloodline,’ Says Expert
  • Uncategorized

This Bitcoin Thesis ‘Will Retire Your Bloodline,’ Says Expert

VedVision HeadLines July 16, 2025

Recent Posts

  • Anthem Biosciences IPO allotment on July 17: Know how to check status online via PAN | step-by-step guide | Business News
  • Dark Partners Hacker Group Drains Crypto Wallets Using Fake AI Tools and VPN Services
  • Q2 Beats & Bullish Forecast
  • This Bitcoin Thesis ‘Will Retire Your Bloodline,’ Says Expert
  • Ajay Kumar Shrivastava takes over as HAL director for engineering, R&D

Recent Comments

No comments to show.

Archives

  • July 2025
  • June 2025
  • May 2025
  • April 2025

Categories

  • Current Affairs
  • Shopping
  • Uncategorized

You may have missed

Anthem Biosciences IPO allotment on July 17: Know how to check status online via PAN | step-by-step guide | Business News
  • Current Affairs

Anthem Biosciences IPO allotment on July 17: Know how to check status online via PAN | step-by-step guide | Business News

VedVision HeadLines July 16, 2025
Dark Partners Hacker Group Drains Crypto Wallets Using Fake AI Tools and VPN Services
  • Uncategorized

Dark Partners Hacker Group Drains Crypto Wallets Using Fake AI Tools and VPN Services

VedVision HeadLines July 16, 2025
Q2 Beats & Bullish Forecast
  • Uncategorized

Q2 Beats & Bullish Forecast

VedVision HeadLines July 16, 2025
This Bitcoin Thesis ‘Will Retire Your Bloodline,’ Says Expert
  • Uncategorized

This Bitcoin Thesis ‘Will Retire Your Bloodline,’ Says Expert

VedVision HeadLines July 16, 2025
Copyright © All rights reserved. | MoreNews by AF themes.