North Korean hackers spread over 1,700 malicious packages across major code registries

April 13, 20262 min read1 sources
Share:
North Korean hackers spread over 1,700 malicious packages across major code registries

A persistent software supply chain campaign attributed to North Korean threat actors has significantly expanded, publishing over 1,700 malicious packages across multiple open-source code registries. The operation, dubbed “Contagious Interview,” now targets developers in the Go, Rust, and PHP ecosystems in addition to its previous focus on npm for JavaScript and PyPI for Python.

According to security researchers, the malicious packages impersonate legitimate developer tooling and popular libraries. Once a developer installs one of these packages, it functions as a malware loader. This initial component establishes a connection to an attacker-controlled server to download and execute a secondary, more damaging payload. This method gives the attackers an initial foothold on a developer’s machine.

The primary impact is the compromise of development environments, which can lead to the theft of credentials, source code, and other intellectual property. An infected developer machine can also serve as a gateway for attackers to pivot into a company's internal network, escalating the potential damage far beyond a single computer.

The expansion into Go, Rust, and PHP indicates a concerted effort to compromise a broader segment of the software development community. By targeting the foundational building blocks used in modern applications, the attackers aim to infect organizations from within their development pipelines. This campaign extends the established playbook of state-sponsored actors who view developers as high-value targets for espionage and financial gain. Organizations are advised to implement strict dependency management practices and utilize security scanning tools to vet third-party code.

Share:

// SOURCES

// RELATED

OpenAI rotates security certificates after supply chain attack hits development pipeline

A malicious package impersonating 'axios' was executed in a GitHub Actions workflow, forcing OpenAI to rotate potentially exposed macOS code-signing k

2 min readApr 14

OpenAI issues Mac app update after developer tool hit by supply chain attack

OpenAI released a precautionary update for its macOS app after a developer tool used in its creation pulled a malicious version of a code library.

2 min readApr 14

Docker flaw lets attackers bypass authorization to gain host access

A high-severity flaw in Docker Engine, CVE-2026-34040, allows attackers to bypass security plugins and gain full access to host systems.

2 min readApr 13

AI-assisted campaign floods GitHub with over 300 malicious repositories

Researchers uncovered 'RepoStorm,' a campaign using AI to create hundreds of fake GitHub repositories that distribute info-stealing malware to develop

2 min readApr 13