Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Contagious Trader campaign - Coordinated weaponisation of cryptocurrency trading bots by suspected DPRK malware operators

0
Medium
Published: Wed Mar 18 2026 (03/18/2026, 10:49:56 UTC)
Source: AlienVault OTX General

Description

The Contagious Trader campaign is a sophisticated malware operation targeting cryptocurrency users, attributed to North Korea with high confidence. It involves malicious cryptocurrency trading bot projects on GitHub that exfiltrate sensitive data and private keys using various techniques, including malicious npm dependencies. The campaign demonstrates overlaps with known North Korean tactics, particularly those of FAMOUS CHOLLIMA, including the use of GitHub, npm, and Vercel infrastructure, Base64-encoded payload URLs, and anonymizing VPNs for npm package publishing. The operation represents a shift in tactics, expanding beyond the previous Contagious Interview campaign to target a broader range of cryptocurrency users.

AI-Powered Analysis

AILast updated: 03/18/2026, 11:28:11 UTC

Technical Analysis

The Contagious Trader campaign represents a coordinated and sophisticated malware operation attributed with high confidence to North Korean (DPRK) threat actors, specifically linked to groups such as FAMOUS CHOLLIMA and Lazarus. This campaign targets cryptocurrency users by weaponizing malicious cryptocurrency trading bots hosted on GitHub. These bots incorporate malicious npm dependencies that facilitate the exfiltration of sensitive user data, including private keys critical for cryptocurrency wallet access. The attackers utilize a combination of open-source infrastructure platforms—GitHub for hosting, npm for package distribution, and Vercel for deployment—to distribute and maintain their malware. The campaign employs advanced evasion techniques such as Base64-encoded payload URLs to obscure malicious code and anonymizing VPNs to mask the origin of npm package publishing activities. This campaign marks a tactical shift from the earlier Contagious Interview campaign, broadening the scope to target a wider range of cryptocurrency users and trading bot projects. The malware leverages multiple MITRE ATT&CK techniques, including data exfiltration (T1041), credential access (T1056.001), command and scripting interpreter usage (T1059.007), and persistence mechanisms (T1547.001). Indicators of compromise include a set of malicious IP addresses and domains used for command and control and data exfiltration. Although no known exploits in the wild have been reported, the campaign’s infrastructure and tactics demonstrate a high level of operational security and sophistication consistent with DPRK cyber operations. The campaign’s goal is primarily financial gain through theft of cryptocurrency assets by compromising trading bots and stealing private keys.

Potential Impact

Organizations and individual cryptocurrency users worldwide face significant risks from this campaign. The compromise of cryptocurrency trading bots can lead to theft of private keys and unauthorized transactions, resulting in direct financial losses. Cryptocurrency exchanges, wallet providers, and trading bot developers may experience reputational damage and loss of customer trust if their platforms or software are implicated. The campaign’s use of legitimate infrastructure like GitHub and npm complicates detection and mitigation, increasing the likelihood of successful infections. The exfiltration of sensitive data undermines confidentiality and integrity of user assets. Given the global nature of cryptocurrency markets, the financial impact can be widespread, affecting users in multiple countries. Additionally, the campaign’s sophisticated evasion techniques may delay incident response and forensic investigations. The medium severity rating reflects the targeted nature of the attack, the complexity of exploitation, and the potential for significant financial damage to affected users and organizations.

Mitigation Recommendations

To mitigate risks from the Contagious Trader campaign, organizations and users should implement a multi-layered defense strategy. First, thoroughly vet and audit all third-party cryptocurrency trading bots and npm packages before deployment, focusing on code integrity and provenance. Employ strict supply chain security practices, including the use of package signing and integrity verification tools. Monitor network traffic for connections to known malicious IP addresses and domains associated with this campaign, and block or isolate suspicious communications. Implement runtime behavior monitoring to detect anomalous data exfiltration or unauthorized access to private keys. Use hardware wallets or secure enclave technologies to protect private keys from software-based compromise. Regularly update and patch all development and deployment environments, including npm dependencies and GitHub repositories. Educate developers and users about the risks of using unverified trading bots and the importance of secure credential management. Employ anomaly detection and threat intelligence feeds to identify emerging indicators related to this campaign. Finally, consider isolating cryptocurrency trading environments from general-purpose networks to limit lateral movement and data leakage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://kmsec.uk/blog/contagious-trader/"]
Adversary
DPRK (North Korea)
Pulse Id
69ba83542e3e56c9806b9659
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip154.38.188.168
ip23.137.105.114
ip39.144.60.174

Url

ValueDescriptionCopy
urlhttp://65.109.25.6:6000/api/polymarket-copytrading-bot-api-key/validate

Domain

ValueDescriptionCopy
domainaurevian.cloud
domainchangelog.rest
domainclob-polymarket.com
domainjacobtan0107.pm
domainpolblxpnl.space
domainpolymarket-clob.com
domainapi.bpkythuat.com
domainapi.fivefingerz.dev
domainapi.mywalletsss.store
domainapi.soladify.fun
domainwww.blxrbn.com

Threat ID: 69ba88a2771bdb17497e4f49

Added to database: 3/18/2026, 11:12:34 AM

Last enriched: 3/18/2026, 11:28:11 AM

Last updated: 3/19/2026, 3:39:35 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses