Wednesday, April 23, 2025
HomecryptocurrencyLazarus Hackers Exploit 6 NPM Packages to Steal Login Credentials

Lazarus Hackers Exploit 6 NPM Packages to Steal Login Credentials

Published on

SIEM as a Service

Follow Us on Google News

North Korea’s Lazarus Group has launched a new wave of attacks targeting the npm ecosystem, compromising six packages designed to steal login credentials and deploy backdoors.

The malicious packages is-buffer-validator, yoojae-validator, event-handle-package, array-empty-validator, react-event-dependency, and auth-validator have collectively been downloaded over 330 times.

These packages mimic the names of widely trusted libraries, employing a typosquatting tactic to deceive developers into integrating them into their workflows.

- Advertisement - Google News

The Lazarus Group’s tactics closely align with their previous operations, including the use of identical obfuscation techniques and cross-platform targeting of Windows, macOS, and Linux systems.

The malware embedded in these packages is designed to collect system environment details, extract sensitive browser data, and target cryptocurrency wallets.

It systematically iterates through browser profiles to locate and extract sensitive files such as login data from Chrome, Brave, and Firefox, as well as keychain archives on macOS.

According to Socket Report, the stolen data is then exfiltrated to a hardcoded command and control (C2) server.

Technical Analysis and Attribution

The code within these malicious packages demonstrates sophisticated obfuscation techniques, including self-invoking functions and dynamic function constructors, to obscure its true functionality.

Despite these layers of concealment, the malware’s objectives align with previously documented Lazarus operations, which have consistently leveraged multi-stage payload delivery and persistence mechanisms to maintain long-term access to compromised systems.

The deployment of BeaverTail malware along with the InvisibleFerret backdoor further reinforces the likelihood of Lazarus’s involvement.

Attributing this attack definitively to Lazarus or a sophisticated copycat remains challenging due to the inherent difficulties in absolute attribution.

However, the tactics, techniques, and procedures (TTPs) observed in this npm attack closely mirror those of Lazarus’s known operations, extensively documented by researchers since 2022.

Mitigation and Recommendations

To mitigate these threats, organizations should implement a multi-layered approach to detection and defense.

Automated dependency auditing and code reviews can help identify anomalies in third-party packages, particularly those with low download counts or from unverified sources.

Continuous monitoring of unusual dependency changes can expose malicious updates, while blocking outbound connections to known C2 endpoints prevents data exfiltration.

Educating development teams on common typosquatting tactics promotes vigilance and reinforces proper vetting before installing new packages.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...