Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group. The coordinated campaign has been codenamed graphalgo in reference to the first package published in the npm registry. It's assessed to be active since May 2025. "
AI Analysis
Technical Summary
Researchers have identified a coordinated supply chain attack campaign, codenamed 'graphalgo,' attributed to the Lazarus Group, a North Korean state-sponsored threat actor. Active since May 2025, the campaign involves publishing malicious packages in the npm and PyPI repositories under names related to graph algorithms and big math utilities. The attack vector begins with social engineering: developers are targeted through fake job offers on social media platforms such as LinkedIn, Facebook, and Reddit, often involving a fabricated company named Veltrix Capital operating in blockchain and cryptocurrency trading. Victims are encouraged to clone GitHub repositories for coding assessments, which depend on the malicious packages hosted on npm and PyPI. These dependencies contain a remote access trojan (RAT) that, once installed, registers with a command-and-control (C2) server using a token-based authentication mechanism. This RAT supports commands for system enumeration, file and process management, and data exfiltration. The malware also checks for the presence of cryptocurrency wallets like MetaMask, indicating a financial theft motive. The campaign’s sophistication is evident in its modular design, encrypted multilayered malware, and patient trust-building approach. Parallel to this, other malicious npm packages such as 'duer-js' have been found to steal sensitive information including browser credentials and cryptocurrency wallet data, exfiltrating it via Discord webhooks and file storage services. Another campaign, dubbed XPACK ATTACK, abuses npm’s package installation process to extort cryptocurrency payments by simulating a payment wall, blocking installation until a ransom is paid. These findings underscore an ongoing trend of supply chain compromises targeting open-source ecosystems to infiltrate developer environments and steal sensitive data or extort funds.
Potential Impact
European organizations, particularly those engaged in software development, blockchain, cryptocurrency, and open-source projects, face significant risks from this campaign. The malicious packages can lead to unauthorized system access, data theft including sensitive credentials and cryptocurrency wallets, and potential lateral movement within corporate networks. The use of social engineering to target developers increases the likelihood of initial compromise, as developers may unwittingly install malicious dependencies during routine coding assessments or project setups. The presence of a RAT capable of extensive system control threatens confidentiality, integrity, and availability of affected systems. Financial theft is a direct risk due to checks for cryptocurrency wallets. The campaign’s stealthy and modular nature complicates detection and remediation, potentially allowing prolonged espionage or data exfiltration. Additionally, the extortion campaigns leveraging npm installations can disrupt developer workflows and cause financial losses. The reputational damage and operational disruptions from such supply chain attacks can be severe, especially for organizations relying heavily on open-source components and remote recruitment processes.
Mitigation Recommendations
1. Implement strict dependency management policies, including verifying package provenance, integrity, and publisher reputation before inclusion in projects. 2. Employ automated tools to scan for known malicious packages and anomalous behaviors in dependencies, such as ReversingLabs or similar threat intelligence platforms. 3. Educate developers and HR teams to recognize social engineering tactics used in fake recruitment campaigns, emphasizing caution when engaging with unsolicited job offers or unknown repositories. 4. Use isolated and sandboxed environments for running untrusted code or coding assessments to prevent infection of production systems. 5. Monitor network traffic for unusual outbound connections, especially to unknown C2 servers, and inspect for token-based authentication patterns indicative of this RAT’s communication. 6. Enforce multi-factor authentication and endpoint detection and response (EDR) solutions capable of detecting suspicious process behaviors related to file manipulation and data exfiltration. 7. Regularly audit and update open-source dependencies to remove or replace suspicious packages. 8. Collaborate with open-source communities and package registries to report and remove malicious packages promptly. 9. For organizations involved in cryptocurrency, implement additional wallet security measures and monitor for unauthorized access attempts. 10. Incorporate supply chain risk assessments into cybersecurity governance frameworks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Ireland, Belgium
Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems
Description
Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group. The coordinated campaign has been codenamed graphalgo in reference to the first package published in the npm registry. It's assessed to be active since May 2025. "
AI-Powered Analysis
Technical Analysis
Researchers have identified a coordinated supply chain attack campaign, codenamed 'graphalgo,' attributed to the Lazarus Group, a North Korean state-sponsored threat actor. Active since May 2025, the campaign involves publishing malicious packages in the npm and PyPI repositories under names related to graph algorithms and big math utilities. The attack vector begins with social engineering: developers are targeted through fake job offers on social media platforms such as LinkedIn, Facebook, and Reddit, often involving a fabricated company named Veltrix Capital operating in blockchain and cryptocurrency trading. Victims are encouraged to clone GitHub repositories for coding assessments, which depend on the malicious packages hosted on npm and PyPI. These dependencies contain a remote access trojan (RAT) that, once installed, registers with a command-and-control (C2) server using a token-based authentication mechanism. This RAT supports commands for system enumeration, file and process management, and data exfiltration. The malware also checks for the presence of cryptocurrency wallets like MetaMask, indicating a financial theft motive. The campaign’s sophistication is evident in its modular design, encrypted multilayered malware, and patient trust-building approach. Parallel to this, other malicious npm packages such as 'duer-js' have been found to steal sensitive information including browser credentials and cryptocurrency wallet data, exfiltrating it via Discord webhooks and file storage services. Another campaign, dubbed XPACK ATTACK, abuses npm’s package installation process to extort cryptocurrency payments by simulating a payment wall, blocking installation until a ransom is paid. These findings underscore an ongoing trend of supply chain compromises targeting open-source ecosystems to infiltrate developer environments and steal sensitive data or extort funds.
Potential Impact
European organizations, particularly those engaged in software development, blockchain, cryptocurrency, and open-source projects, face significant risks from this campaign. The malicious packages can lead to unauthorized system access, data theft including sensitive credentials and cryptocurrency wallets, and potential lateral movement within corporate networks. The use of social engineering to target developers increases the likelihood of initial compromise, as developers may unwittingly install malicious dependencies during routine coding assessments or project setups. The presence of a RAT capable of extensive system control threatens confidentiality, integrity, and availability of affected systems. Financial theft is a direct risk due to checks for cryptocurrency wallets. The campaign’s stealthy and modular nature complicates detection and remediation, potentially allowing prolonged espionage or data exfiltration. Additionally, the extortion campaigns leveraging npm installations can disrupt developer workflows and cause financial losses. The reputational damage and operational disruptions from such supply chain attacks can be severe, especially for organizations relying heavily on open-source components and remote recruitment processes.
Mitigation Recommendations
1. Implement strict dependency management policies, including verifying package provenance, integrity, and publisher reputation before inclusion in projects. 2. Employ automated tools to scan for known malicious packages and anomalous behaviors in dependencies, such as ReversingLabs or similar threat intelligence platforms. 3. Educate developers and HR teams to recognize social engineering tactics used in fake recruitment campaigns, emphasizing caution when engaging with unsolicited job offers or unknown repositories. 4. Use isolated and sandboxed environments for running untrusted code or coding assessments to prevent infection of production systems. 5. Monitor network traffic for unusual outbound connections, especially to unknown C2 servers, and inspect for token-based authentication patterns indicative of this RAT’s communication. 6. Enforce multi-factor authentication and endpoint detection and response (EDR) solutions capable of detecting suspicious process behaviors related to file manipulation and data exfiltration. 7. Regularly audit and update open-source dependencies to remove or replace suspicious packages. 8. Collaborate with open-source communities and package registries to report and remove malicious packages promptly. 9. For organizations involved in cryptocurrency, implement additional wallet security measures and monitor for unauthorized access attempts. 10. Incorporate supply chain risk assessments into cybersecurity governance frameworks.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/02/lazarus-campaign-plants-malicious.html","fetched":true,"fetchedAt":"2026-02-13T07:29:31.201Z","wordCount":1507}
Threat ID: 698ed2ddc9e1ff5ad8037a5c
Added to database: 2/13/2026, 7:29:33 AM
Last enriched: 2/13/2026, 7:29:52 AM
Last updated: 2/21/2026, 12:07:25 AM
Views: 159
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumCVE-2026-27025: CWE-834: Excessive Iteration in py-pdf pypdf
MediumCVE-2026-27024: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in py-pdf pypdf
MediumCVE-2026-27022: CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in langchain-ai langgraphjs
MediumCVE-2026-2490: CWE-59: Improper Link Resolution Before File Access ('Link Following') in RustDesk Client for Windows
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.