Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

North Korea's latest supply chain attack: A sophisticated campaign to siphon money from cryptocurrency wallets



North Korea has launched a new supply chain attack targeting cryptocurrency wallet owners, using a sophisticated JavaScript-based payload that hides itself in GitHub repositories and NPM packages. The "Operation Marstech Mayhem" campaign has already affected 233 individuals, highlighting the growing threat of North Korean cyberattacks and the need for organizations to adopt proactive security measures.

  • North Korea has launched a new cyberattack campaign dubbed "Operation Marstech Mayhem" targeting cryptocurrency wallets.
  • The attack uses a JavaScript-based payload called Marstech1 that hides itself in GitHub repositories and NPM packages.
  • The implant scans compromised systems for wallets of interest, reads their contents, and extracts metadata.
  • The attack employs sophisticated obfuscation techniques making it difficult to detect using static or dynamic analysis methods.
  • Microsoft has also released intel on another North Korean cyber team, Kimsuky, which uses tactics like phishing and PowerShell to steal data.
  • Organizations and developers must adopt proactive security measures to mitigate the risk of sophisticated implant-based attacks.



  • North Korea has once again demonstrated its commitment to using sophisticated cyberattacks to achieve its financial and strategic objectives. The latest campaign, dubbed "Operation Marstech Mayhem," targets the NPM (Node Package Manager) registry and owners of Exodus and Atomic cryptocurrency wallets, highlighting the evolving tradecraft of North Korea's cybercrime group, Lazarus.

    According to research conducted by SecurityScorecard, 233 individual victims have been confirmed thus far after installing the new Marstech1 implant, a JavaScript-based payload that hides itself in GitHub repositories and NPM packages typically used by crypto developers. The implant's capabilities primarily involve targeting cryptocurrency wallets across Windows, macOS, and Linux platforms, scanning compromised systems for wallets of interest, reading their contents, and extracting metadata.

    The implant's sophisticated features include control flow flattening, self-invoking functions, random variable and function names, Base64 string encoding, anti-debugging checks, and splitting and recombining strings. These layered obfuscation techniques make it extremely difficult to detect the implant using static or dynamic analysis methods. Moreover, the Marstech1 payload employs alternative methods such as Base85 encoding and XOR decryption to further enhance its stealth capabilities.

    SecurityScorecard's research highlights a critical evolution in Lazarus's supply chain attacks, demonstrating not only their commitment to operational stealth but also significant adaptability in implant development. The introduction of the Marstech1 implant underscores the threat actor's sophisticated approach to avoiding both static and dynamic analysis methods.

    Furthermore, Microsoft has recently released some fresh intel on North Korea's activity, focusing on another of the country's offensive cyber teams, Kimsuky. This new tactic involves posing as a South Korean government official, building rapport with a victim over time, and eventually convincing them to run PowerShell as admin and execute harmful code. The trick involves sending victims a PDF via email that directs them to a URL with instructions on how to register their device in order to read it. Those instructions tell the victim to launch PowerShell and execute the code.

    If the target runs the code as an administrator, the code downloads and installs a browser-based remote desktop tool and downloads a certificate file with a hardcoded PIN from a remote server. The victim's device is then registered with the server, allowing Kimsuky to start lifting data from the machine.

    The implications of these attacks are far-reaching, emphasizing the need for organizations and developers to adopt proactive security measures, continuously monitor supply chain activities, and integrate advanced threat intelligence solutions to mitigate the risk of sophisticated implant-based attacks orchestrated by threat actors like the Lazarus Group.

    In conclusion, North Korea's latest campaign against cryptocurrency wallets highlights the country's continued reliance on sophisticated cyberattacks to achieve its financial objectives. As the threat landscape continues to evolve, it is imperative for organizations and developers to stay vigilant and proactive in protecting themselves against these evolving threats.

    Related Information:

  • https://go.theregister.com/feed/www.theregister.com/2025/02/13/north_korea_npm_crypto/


  • Published: Thu Feb 13 07:45:07 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us