Novel DPRK stager using Pastebin and text steganography
A novel malware campaign attributed to the DPRK-linked threat actor FAMOUS CHOLLIMA leverages seventeen malicious npm packages to infect Windows, macOS, and Linux systems. It uses Pastebin as a dead-drop resolver, hiding command-and-control (C2) URLs within seemingly benign text via a complex text steganography decoding mechanism. The infection chain includes fallback domains hosted on Vercel to maintain persistence and evade detection. The malware downloads and executes platform-specific payloads, demonstrating multi-platform targeting and sophisticated evasion techniques. This campaign reflects an accelerated development pace by the adversary, indicating evolving infection methodologies. No known exploits in the wild have been reported yet, but the campaign’s complexity and multi-stage infection pose significant risks. The threat actor employs multiple TTPs including living-off-the-land binaries, obfuscation, and network communications over common protocols. Organizations using npm packages and those with Windows, macOS, or Linux endpoints should be vigilant. The campaign’s use of public platforms like Pastebin and Vercel complicates detection and takedown efforts. Mitigation requires enhanced supply chain security, monitoring for suspicious npm packages, and network traffic analysis for unusual Pastebin or Vercel communications.
AI Analysis
Technical Summary
This campaign involves a set of seventeen malicious npm packages that serve as initial stagers for a multi-platform malware infection targeting Windows, macOS, and Linux systems. The attackers use Pastebin as a covert dead-drop resolver, embedding command-and-control (C2) URLs within innocuous-looking text using advanced text steganography techniques. The stager includes a complex decoding mechanism to extract these hidden URLs, which are then used to download platform-specific payloads. To maintain persistence and resilience, the infection chain employs multiple fallback domains hosted on Vercel, a popular cloud platform, allowing the malware to evade simple domain blacklisting and takedown attempts. The campaign is attributed to the DPRK-linked threat actor FAMOUS CHOLLIMA, known for sophisticated and evolving malware operations. The infection leverages various MITRE ATT&CK techniques such as command execution via JavaScript (T1059.007), discovery (T1082), masquerading (T1036), fallback channels (T1102), credential access (T1552.001), and persistence mechanisms (T1547.001). The use of npm packages as an infection vector highlights a supply chain attack approach, targeting developers and organizations relying on JavaScript dependencies. The campaign’s multi-platform nature and use of public infrastructure for C2 communications complicate detection and mitigation. No CVE or known exploits in the wild have been reported, but the campaign’s sophistication and stealthy techniques indicate a medium severity threat with potential for significant impact if successful.
Potential Impact
The campaign poses a substantial risk to organizations worldwide, especially those utilizing npm packages in their software development lifecycle or maintaining heterogeneous environments with Windows, macOS, and Linux endpoints. Successful infections could lead to unauthorized remote code execution, data exfiltration, lateral movement, and long-term persistence within networks. The use of public platforms like Pastebin and Vercel for C2 communications makes detection challenging, increasing the likelihood of prolonged undetected presence. Supply chain compromise via npm packages threatens software integrity and trust, potentially impacting software development pipelines and downstream consumers. Organizations in sectors with high-value intellectual property, critical infrastructure, or geopolitical interest are at elevated risk of targeted attacks. The multi-platform capability broadens the attack surface, affecting diverse environments. Although no known exploits in the wild have been reported yet, the campaign’s ongoing development suggests a risk of escalation and wider deployment. The medium severity rating reflects the complexity and stealth of the campaign balanced against the current lack of widespread exploitation evidence.
Mitigation Recommendations
1. Implement strict supply chain security controls including vetting and monitoring of npm packages before integration into projects. 2. Employ software composition analysis (SCA) tools to detect and block malicious or suspicious npm packages. 3. Monitor network traffic for unusual or unexpected connections to Pastebin, Vercel, or other public cloud platforms, especially those involving encoded or obfuscated data. 4. Deploy endpoint detection and response (EDR) solutions capable of identifying suspicious JavaScript execution and multi-platform payload behaviors. 5. Enforce least privilege principles and application whitelisting to limit execution of unauthorized scripts or binaries. 6. Regularly audit and update fallback domain blocklists, including domains hosted on cloud platforms like Vercel. 7. Educate development teams about the risks of supply chain attacks and encourage use of trusted package sources. 8. Use threat intelligence feeds to update detection rules with known hashes and indicators of compromise (IOCs) related to this campaign. 9. Implement multi-factor authentication and credential hygiene to mitigate credential theft risks. 10. Conduct proactive threat hunting focusing on steganography and dead-drop resolver techniques in network and endpoint logs.
Affected Countries
United States, South Korea, Japan, United Kingdom, Germany, Canada, Australia, France, Netherlands, Singapore
Indicators of Compromise
- hash: 869c327b8dc757fa126cd281bc4a14d809c50e9a792954442c55cea5b46912ec
- hash: accf04ad3228a22532d2f5802a5b0c379c3616564c4766fc1f1ca20dac8dba07
- hash: bce0da6547ae74f97e2bb61672a3e159b837acf01f7c68a813ea75c3835ff303
- hash: da1775d0fbe99fbc35b6f0b4a3a3cb84da3ca1b2c1bbac0842317f6f804e30a4
- hash: e361d2859ba2eb2540bf6fb12db0b9857ef610bb9920830921e986d4b9109e89
Novel DPRK stager using Pastebin and text steganography
Description
A novel malware campaign attributed to the DPRK-linked threat actor FAMOUS CHOLLIMA leverages seventeen malicious npm packages to infect Windows, macOS, and Linux systems. It uses Pastebin as a dead-drop resolver, hiding command-and-control (C2) URLs within seemingly benign text via a complex text steganography decoding mechanism. The infection chain includes fallback domains hosted on Vercel to maintain persistence and evade detection. The malware downloads and executes platform-specific payloads, demonstrating multi-platform targeting and sophisticated evasion techniques. This campaign reflects an accelerated development pace by the adversary, indicating evolving infection methodologies. No known exploits in the wild have been reported yet, but the campaign’s complexity and multi-stage infection pose significant risks. The threat actor employs multiple TTPs including living-off-the-land binaries, obfuscation, and network communications over common protocols. Organizations using npm packages and those with Windows, macOS, or Linux endpoints should be vigilant. The campaign’s use of public platforms like Pastebin and Vercel complicates detection and takedown efforts. Mitigation requires enhanced supply chain security, monitoring for suspicious npm packages, and network traffic analysis for unusual Pastebin or Vercel communications.
AI-Powered Analysis
Technical Analysis
This campaign involves a set of seventeen malicious npm packages that serve as initial stagers for a multi-platform malware infection targeting Windows, macOS, and Linux systems. The attackers use Pastebin as a covert dead-drop resolver, embedding command-and-control (C2) URLs within innocuous-looking text using advanced text steganography techniques. The stager includes a complex decoding mechanism to extract these hidden URLs, which are then used to download platform-specific payloads. To maintain persistence and resilience, the infection chain employs multiple fallback domains hosted on Vercel, a popular cloud platform, allowing the malware to evade simple domain blacklisting and takedown attempts. The campaign is attributed to the DPRK-linked threat actor FAMOUS CHOLLIMA, known for sophisticated and evolving malware operations. The infection leverages various MITRE ATT&CK techniques such as command execution via JavaScript (T1059.007), discovery (T1082), masquerading (T1036), fallback channels (T1102), credential access (T1552.001), and persistence mechanisms (T1547.001). The use of npm packages as an infection vector highlights a supply chain attack approach, targeting developers and organizations relying on JavaScript dependencies. The campaign’s multi-platform nature and use of public infrastructure for C2 communications complicate detection and mitigation. No CVE or known exploits in the wild have been reported, but the campaign’s sophistication and stealthy techniques indicate a medium severity threat with potential for significant impact if successful.
Potential Impact
The campaign poses a substantial risk to organizations worldwide, especially those utilizing npm packages in their software development lifecycle or maintaining heterogeneous environments with Windows, macOS, and Linux endpoints. Successful infections could lead to unauthorized remote code execution, data exfiltration, lateral movement, and long-term persistence within networks. The use of public platforms like Pastebin and Vercel for C2 communications makes detection challenging, increasing the likelihood of prolonged undetected presence. Supply chain compromise via npm packages threatens software integrity and trust, potentially impacting software development pipelines and downstream consumers. Organizations in sectors with high-value intellectual property, critical infrastructure, or geopolitical interest are at elevated risk of targeted attacks. The multi-platform capability broadens the attack surface, affecting diverse environments. Although no known exploits in the wild have been reported yet, the campaign’s ongoing development suggests a risk of escalation and wider deployment. The medium severity rating reflects the complexity and stealth of the campaign balanced against the current lack of widespread exploitation evidence.
Mitigation Recommendations
1. Implement strict supply chain security controls including vetting and monitoring of npm packages before integration into projects. 2. Employ software composition analysis (SCA) tools to detect and block malicious or suspicious npm packages. 3. Monitor network traffic for unusual or unexpected connections to Pastebin, Vercel, or other public cloud platforms, especially those involving encoded or obfuscated data. 4. Deploy endpoint detection and response (EDR) solutions capable of identifying suspicious JavaScript execution and multi-platform payload behaviors. 5. Enforce least privilege principles and application whitelisting to limit execution of unauthorized scripts or binaries. 6. Regularly audit and update fallback domain blocklists, including domains hosted on cloud platforms like Vercel. 7. Educate development teams about the risks of supply chain attacks and encourage use of trusted package sources. 8. Use threat intelligence feeds to update detection rules with known hashes and indicators of compromise (IOCs) related to this campaign. 9. Implement multi-factor authentication and credential hygiene to mitigate credential theft risks. 10. Conduct proactive threat hunting focusing on steganography and dead-drop resolver techniques in network and endpoint logs.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://kmsec.uk/blog/dprk-text-steganography/"]
- Adversary
- FAMOUS CHOLLIMA
- Pulse Id
- 69a5c3fba23226d70fc59eb2
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash869c327b8dc757fa126cd281bc4a14d809c50e9a792954442c55cea5b46912ec | — | |
hashaccf04ad3228a22532d2f5802a5b0c379c3616564c4766fc1f1ca20dac8dba07 | — | |
hashbce0da6547ae74f97e2bb61672a3e159b837acf01f7c68a813ea75c3835ff303 | — | |
hashda1775d0fbe99fbc35b6f0b4a3a3cb84da3ca1b2c1bbac0842317f6f804e30a4 | — | |
hashe361d2859ba2eb2540bf6fb12db0b9857ef610bb9920830921e986d4b9109e89 | — |
Threat ID: 69a6056dd1a09e29cb500441
Added to database: 3/2/2026, 9:47:25 PM
Last enriched: 3/2/2026, 10:03:20 PM
Last updated: 3/2/2026, 11:56:40 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Fake Zoom meeting 'update' silently installs unauthorized version of monitoring tool abused by cybercriminals to spy on victims
MediumPlugX Meeting Invitation via MSBuild and GDATA
MediumAbusing Windows File Explorer and WebDAV for Malware Delivery
MediumNew Dohdoor malware campaign targets education and health care
MediumContagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains - Part 1
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.