Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Novel DPRK stager using Pastebin and text steganography

0
Medium
Published: Mon Mar 02 2026 (03/02/2026, 17:08:11 UTC)
Source: AlienVault OTX General

Description

A novel malware campaign attributed to the DPRK-linked threat actor FAMOUS CHOLLIMA leverages seventeen malicious npm packages to infect Windows, macOS, and Linux systems. It uses Pastebin as a dead-drop resolver, hiding command-and-control (C2) URLs within seemingly benign text via a complex text steganography decoding mechanism. The infection chain includes fallback domains hosted on Vercel to maintain persistence and evade detection. The malware downloads and executes platform-specific payloads, demonstrating multi-platform targeting and sophisticated evasion techniques. This campaign reflects an accelerated development pace by the adversary, indicating evolving infection methodologies. No known exploits in the wild have been reported yet, but the campaign’s complexity and multi-stage infection pose significant risks. The threat actor employs multiple TTPs including living-off-the-land binaries, obfuscation, and network communications over common protocols. Organizations using npm packages and those with Windows, macOS, or Linux endpoints should be vigilant. The campaign’s use of public platforms like Pastebin and Vercel complicates detection and takedown efforts. Mitigation requires enhanced supply chain security, monitoring for suspicious npm packages, and network traffic analysis for unusual Pastebin or Vercel communications.

AI-Powered Analysis

AILast updated: 03/02/2026, 22:03:20 UTC

Technical Analysis

This campaign involves a set of seventeen malicious npm packages that serve as initial stagers for a multi-platform malware infection targeting Windows, macOS, and Linux systems. The attackers use Pastebin as a covert dead-drop resolver, embedding command-and-control (C2) URLs within innocuous-looking text using advanced text steganography techniques. The stager includes a complex decoding mechanism to extract these hidden URLs, which are then used to download platform-specific payloads. To maintain persistence and resilience, the infection chain employs multiple fallback domains hosted on Vercel, a popular cloud platform, allowing the malware to evade simple domain blacklisting and takedown attempts. The campaign is attributed to the DPRK-linked threat actor FAMOUS CHOLLIMA, known for sophisticated and evolving malware operations. The infection leverages various MITRE ATT&CK techniques such as command execution via JavaScript (T1059.007), discovery (T1082), masquerading (T1036), fallback channels (T1102), credential access (T1552.001), and persistence mechanisms (T1547.001). The use of npm packages as an infection vector highlights a supply chain attack approach, targeting developers and organizations relying on JavaScript dependencies. The campaign’s multi-platform nature and use of public infrastructure for C2 communications complicate detection and mitigation. No CVE or known exploits in the wild have been reported, but the campaign’s sophistication and stealthy techniques indicate a medium severity threat with potential for significant impact if successful.

Potential Impact

The campaign poses a substantial risk to organizations worldwide, especially those utilizing npm packages in their software development lifecycle or maintaining heterogeneous environments with Windows, macOS, and Linux endpoints. Successful infections could lead to unauthorized remote code execution, data exfiltration, lateral movement, and long-term persistence within networks. The use of public platforms like Pastebin and Vercel for C2 communications makes detection challenging, increasing the likelihood of prolonged undetected presence. Supply chain compromise via npm packages threatens software integrity and trust, potentially impacting software development pipelines and downstream consumers. Organizations in sectors with high-value intellectual property, critical infrastructure, or geopolitical interest are at elevated risk of targeted attacks. The multi-platform capability broadens the attack surface, affecting diverse environments. Although no known exploits in the wild have been reported yet, the campaign’s ongoing development suggests a risk of escalation and wider deployment. The medium severity rating reflects the complexity and stealth of the campaign balanced against the current lack of widespread exploitation evidence.

Mitigation Recommendations

1. Implement strict supply chain security controls including vetting and monitoring of npm packages before integration into projects. 2. Employ software composition analysis (SCA) tools to detect and block malicious or suspicious npm packages. 3. Monitor network traffic for unusual or unexpected connections to Pastebin, Vercel, or other public cloud platforms, especially those involving encoded or obfuscated data. 4. Deploy endpoint detection and response (EDR) solutions capable of identifying suspicious JavaScript execution and multi-platform payload behaviors. 5. Enforce least privilege principles and application whitelisting to limit execution of unauthorized scripts or binaries. 6. Regularly audit and update fallback domain blocklists, including domains hosted on cloud platforms like Vercel. 7. Educate development teams about the risks of supply chain attacks and encourage use of trusted package sources. 8. Use threat intelligence feeds to update detection rules with known hashes and indicators of compromise (IOCs) related to this campaign. 9. Implement multi-factor authentication and credential hygiene to mitigate credential theft risks. 10. Conduct proactive threat hunting focusing on steganography and dead-drop resolver techniques in network and endpoint logs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://kmsec.uk/blog/dprk-text-steganography/"]
Adversary
FAMOUS CHOLLIMA
Pulse Id
69a5c3fba23226d70fc59eb2
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash869c327b8dc757fa126cd281bc4a14d809c50e9a792954442c55cea5b46912ec
hashaccf04ad3228a22532d2f5802a5b0c379c3616564c4766fc1f1ca20dac8dba07
hashbce0da6547ae74f97e2bb61672a3e159b837acf01f7c68a813ea75c3835ff303
hashda1775d0fbe99fbc35b6f0b4a3a3cb84da3ca1b2c1bbac0842317f6f804e30a4
hashe361d2859ba2eb2540bf6fb12db0b9857ef610bb9920830921e986d4b9109e89

Threat ID: 69a6056dd1a09e29cb500441

Added to database: 3/2/2026, 9:47:25 PM

Last enriched: 3/2/2026, 10:03:20 PM

Last updated: 3/2/2026, 11:56:40 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses