Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
    Cybersecurity

    Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

    adminBy adminFebruary 13, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group.

    The coordinated campaign has been codenamed graphalgo in reference to the first package published in the npm registry. It’s assessed to be active since May 2025.

    “Developers are approached via social platforms like LinkedIn and Facebook, or through job offerings on forums like Reddit,” ReversingLabs researcher Karlo Zanki said in a report. “The campaign includes a well-orchestrated story around a company involved in blockchain and cryptocurrency exchanges.”

    Notably, one of the identified npm packages, bigmathutils, attracted more than 10,000 downloads after the first, non-malicious version was published, and before the second version containing a malicious payload was released. The names of the packages are listed below –

    npm – 

    • graphalgo
    • graphorithm
    • graphstruct
    • graphlibcore
    • netstruct
    • graphnetworkx
    • terminalcolor256
    • graphkitx
    • graphchain
    • graphflux
    • graphorbit
    • graphnet
    • graphhub
    • terminal-kleur
    • graphrix
    • bignumx
    • bignumberx
    • bignumex
    • bigmathex
    • bigmathlib
    • bigmathutils
    • graphlink
    • bigmathix
    • graphflowx

    PyPI –

    • graphalgo
    • graphex
    • graphlibx
    • graphdict
    • graphflux
    • graphnode
    • graphsync
    • bigpyx
    • bignum
    • bigmathex
    • bigmathix
    • bigmathutils

    As with many job-focused campaigns conducted by North Korean threat actors, the attack chain begins with establishing a fake company like Veltrix Capital in the blockchain and cryptocurrency trading space, and then setting up the necessary digital real estate to create an illusion of legitimacy.

    This includes registering a domain and creating a related GitHub organization to host several repositories for use in coding assessments. The repositories have been found to contain projects based on Python and JavaScript.

    “Examination of these repositories didn’t reveal any obvious malicious functionality,” Zanki said. “That is because the malicious functionality was not introduced directly via the job interview repositories, but indirectly – through dependencies hosted on the npm and PyPI open-source package repositories.”

    The idea behind setting up these repositories is to trick candidates who apply to its job listings on Reddit and Facebook Groups into running the projects on their machines, effectively installing the malicious dependency and triggering the infection. In some cases, victims are directly contacted by seemingly legitimate recruiters on LinkedIn.

    The packages ultimately act as a conduit to deploy a remote access trojan (RAT) that periodically fetches and executes commands from an external server. It supports various commands to gather system information, enumerate files and directories, list running processes, create folders, rename files, delete files, and upload/download files.

    Interestingly, the command-and-control (C2) communication is protected by a token-based mechanism to ensure that only requests with a valid token are accepted. The approach was previously observed in 2023 campaigns linked to a North Korean hacking group called Jade Sleet, which is also known as TraderTraitor or UNC4899.

    It essentially works like this: the packages send system data as part of a registration step to the C2 server, which responds with a token. This token is then sent back to the C2 server in subsequent requests to establish that they are originating from an already registered infected system.

    “The token-based approach is a similarity […] in both cases and has not been used by other actors in malware hosted on public package repositories as far as we know,” Zanki told The Hacker News at that time.

    The findings show that North Korean state-sponsored threat actors continue to poison open-source ecosystems with malicious packages in hopes of stealing sensitive data and conducting financial theft, a fact evidenced by the RAT’s checks to determine if the MetaMask browser extension is installed in the machine.

    “Evidence suggests that this is a highly sophisticated campaign,” ReversingLabs said. “Its modularity, long-lived nature, patience in building trust across different campaign elements, and the complexity of the multilayered and encrypted malware point to the work of a state-sponsored threat actor.”

    More Malicious npm Packages Found

    The disclosure comes as JFrog uncovered a sophisticated, malicious npm package called “duer-js” published by a user named “luizaearlyx.” While the library claims to be a utility to “make the console window more visible,” it harbors a Windows information stealer called Bada Stealer.

    It’s capable of gathering Discord tokens, passwords, cookies, and autofill data from Google Chrome, Microsoft Edge, Brave, Opera, and Yandex Browser, cryptocurrency wallet details, and system information. The data is then exfiltrated to a Discord webhook, as well as the Gofile file storage service as a backup.

    “In addition to stealing information from the host it infected, the malicious package downloads a secondary payload,” security researcher Guy Korolevski said. “This payload is designed to run on the Discord Desktop app startup, with self-updating capabilities, stealing directly from it, including payment methods used by the user.”

    It also coincides with the discovery of another malware campaign that weaponizes npm to extort cryptocurrency payments from developers during package installation using the “npm install” command. The campaign, first recorded on February 4, 2026, has been dubbed XPACK ATTACK by OpenSourceMalware.

    duer-js malicious package flow, hijacking Discord’s Electron environment

    The names of the packages, all uploaded by a user named “dev.chandra_bose,” are listed below –

    • xpack-per-user
    • xpack-per-device
    • xpack-sui
    • xpack-subscription
    • xpack-arc-gateway
    • xpack-video-submission
    • test-npm-style
    • xpack-subscription-test
    • testing-package-xdsfdsfsc

    “Unlike traditional malware that steals credentials or executes reverse shells, this attack innovatively abuses the HTTP 402 ‘Payment Required’ status code to create a seemingly legitimate payment wall,” security researcher Paul McCarty said. “The attack blocks installation until victims pay 0.1 USDC/ETH to the attacker’s wallet, while collecting GitHub usernames and device fingerprints.”

    “If they refuse to pay, the installation simply fails after wasting 5+ minutes of their development time, and they may not even realize they’ve encountered malware versus what appeared to be a legitimate paywall for package access.”

    Campaign Ecosystems Lazarus Malicious npm Packages Plants PyPI
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGrab the ultimate Galaxy Watch experience for less thanks to a hefty $350 discount
    Next Article Cisco highlights memory costs, Silicon One growth in Q2 recap
    admin
    • Website

    Related Posts

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Home Assistant’s intimidating reputation is completely undeserved once you survive the first week

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,400)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,675)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026
    Most Popular
    • The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now
    • Apple AirTag tracking can be misled by replayed Bluetooth signals
    • NIST to stop rating non-priority flaws due to volume increase
    • Home Assistant’s intimidating reputation is completely undeserved once you survive the first week
    • The Complete Guide To Agentic Commerce
    • I’ve used Samsung Browser for years, but this is why I won’t go back to Chrome
    • This $10 accessory has completely transformed my Pixel 10
    • Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.