PurpleBravo’s Targeting of the IT Software Supply Chain
PurpleBravo, a North Korean state-sponsored threat group, targets software developers through fake recruitment efforts, particularly in cryptocurrency and software development sectors. Their toolkit includes BeaverTail, PyLangGhost, and GolangGhost, designed for stealing browser credentials and cryptocurrency information. The group has affected 3,136 IP addresses, mainly in South Asia and North America, compromising 20 organizations across various industries. PurpleBravo's tactics include using fictitious personas, malicious GitHub repositories, and sophisticated malware to infiltrate IT services companies, posing a significant supply-chain risk. The group shows overlap with PurpleDelta, another North Korean threat actor, sharing infrastructure and operational patterns. PurpleBravo's focus on the IT sector in South Asia presents an overlooked threat to organizations outsourcing IT services.
AI Analysis
Technical Summary
PurpleBravo is a North Korean state-sponsored cyber espionage group focusing on the IT software supply chain, particularly targeting software developers through fake recruitment efforts. Their primary targets are individuals and organizations involved in cryptocurrency and software development sectors. The group employs a combination of social engineering tactics, including the creation of fictitious personas and malicious GitHub repositories, to lure victims into downloading malware. Their malware toolkit includes BeaverTail, PyLangGhost, and GolangGhost, which are designed to steal browser credentials and cryptocurrency-related information. The campaign has compromised over 3,100 IP addresses and 20 organizations, mainly in South Asia and North America, but the supply chain nature of the attack means that downstream organizations globally, including in Europe, could be affected. PurpleBravo shares infrastructure and operational patterns with PurpleDelta, another North Korean threat actor, indicating a coordinated effort. The group’s tactics include remote access trojans, credential theft, and leveraging software supply chain weaknesses to infiltrate IT services companies. The threat is particularly dangerous because it targets the software development lifecycle, potentially allowing attackers to insert malicious code or compromise credentials that can be used for further attacks. Despite no known public exploits, the sophistication and persistence of PurpleBravo make it a significant threat to organizations relying on outsourced IT services or involved in cryptocurrency. The campaign highlights the risks of social engineering combined with supply chain attacks, emphasizing the need for enhanced vetting and monitoring of third-party developers and repositories.
Potential Impact
For European organizations, the PurpleBravo campaign poses a significant risk primarily through the IT software supply chain, especially for those outsourcing software development or IT services to regions like South Asia. Compromise of developer credentials or insertion of malicious code into software products can lead to widespread downstream impacts, including data breaches, intellectual property theft, and disruption of critical business operations. Cryptocurrency firms in Europe are also at risk of losing sensitive wallet credentials and funds. The theft of browser credentials can facilitate further lateral movement and espionage within corporate networks. Given the group's state-sponsored nature and ties to North Korea, there is a heightened risk of espionage and sabotage targeting strategic industries. The supply chain attack vector means that even organizations not directly targeted can be affected if their suppliers are compromised. This could impact sectors such as finance, technology, and critical infrastructure. The campaign's use of sophisticated social engineering and malware tools increases the likelihood of successful infiltration, potentially leading to long-term undetected presence within networks. The medium severity rating reflects the targeted but impactful nature of the threat, with potential for significant confidentiality and integrity breaches if not mitigated.
Mitigation Recommendations
European organizations should implement rigorous vetting and continuous monitoring of third-party software developers and IT service providers, especially those located in or sourcing from South Asia. Enforce strict access controls and multi-factor authentication (MFA) for all developer and administrative accounts to reduce the risk of credential theft exploitation. Monitor for suspicious activity related to GitHub repositories and other code repositories, including unexpected code changes or repository forks from unknown contributors. Employ endpoint detection and response (EDR) solutions capable of detecting malware families like BeaverTail, PyLangGhost, and GolangGhost, focusing on browser credential theft and remote access trojans. Conduct regular security awareness training emphasizing social engineering risks, particularly fake recruitment scams and phishing attempts. Implement network segmentation to limit lateral movement if a compromise occurs. Use threat intelligence feeds to stay updated on PurpleBravo indicators and tactics, and integrate these into security information and event management (SIEM) systems for proactive detection. Regularly audit and update supply chain security policies, including software bill of materials (SBOM) to track dependencies and potential risks. Finally, establish incident response plans specifically addressing supply chain compromise scenarios to enable rapid containment and remediation.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Italy, Spain, Poland
Indicators of Compromise
- hash: 1ddb90ee672c86e09168792871f6d6d00919b57d24da98d91764e292e765cd29
- ip: 103.111.113.26
- ip: 103.125.234.107
- ip: 103.125.234.161
- ip: 103.125.234.210
- ip: 103.125.234.62
- ip: 103.130.145.210
- ip: 103.157.217.145
- ip: 103.16.228.16
- ip: 103.172.26.58
- ip: 103.50.33.16
- ip: 104.168.14.206
- ip: 104.223.63.2
- ip: 107.150.38.250
- ip: 107.167.244.42
- ip: 107.167.25.130
- ip: 107.189.24.80
- ip: 108.181.41.234
- ip: 125.227.75.208
- ip: 125.227.80.190
- ip: 125.227.82.145
- ip: 125.227.90.115
- ip: 135.181.7.162
- ip: 14.37.47.13
- ip: 142.214.202.2
- ip: 144.172.100.124
- ip: 144.172.100.142
- ip: 144.172.102.148
- ip: 144.172.102.21
- ip: 144.172.103.97
- ip: 144.172.104.113
- ip: 144.172.105.189
- ip: 144.172.105.235
- ip: 144.172.106.133
- ip: 144.172.106.7
- ip: 144.172.109.155
- ip: 144.172.109.98
- ip: 144.172.112.106
- ip: 144.172.95.226
- ip: 146.70.253.107
- ip: 147.124.197.138
- ip: 147.124.212.125
- ip: 147.124.213.19
- ip: 147.124.213.232
- ip: 147.124.214.129
- ip: 147.124.214.131
- ip: 147.124.214.237
- ip: 151.243.101.229
- ip: 154.58.204.15
- ip: 154.62.226.22
- ip: 155.94.199.59
- ip: 158.255.76.195
- ip: 158.62.198.177
- ip: 16.173.115.200
- ip: 162.251.62.70
- ip: 162.251.70.66
- ip: 165.140.85.105
- ip: 165.140.86.154
- ip: 165.140.86.160
- ip: 165.140.86.181
- ip: 165.140.86.227
- ip: 166.0.190.170
- ip: 167.88.61.117
- ip: 167.88.61.148
- ip: 169.38.75.87
- ip: 169.38.98.22
- ip: 172.86.109.49
- ip: 172.86.113.115
- ip: 172.86.116.90
- ip: 172.86.123.55
- ip: 172.86.73.198
- ip: 173.211.70.246
- ip: 173.254.200.134
- ip: 176.222.52.77
- ip: 178.159.7.34
- ip: 178.175.128.98
- ip: 185.135.76.115
- ip: 185.135.76.89
- ip: 188.43.33.252
- ip: 192.161.60.132
- ip: 192.74.247.161
- ip: 193.19.205.26
- ip: 194.33.45.162
- ip: 195.146.5.31
- ip: 198.2.228.23
- ip: 198.23.148.18
- ip: 202.87.221.237
- ip: 204.152.202.111
- ip: 204.44.96.131
- ip: 205.234.203.122
- ip: 206.206.127.135
- ip: 206.206.127.80
- ip: 211.21.6.136
- ip: 211.21.6.181
- ip: 211.22.147.226
- ip: 211.72.116.247
- ip: 211.72.35.109
- ip: 211.72.35.118
- ip: 211.75.42.136
- ip: 211.75.74.223
- ip: 212.81.47.217
- ip: 216.126.229.166
- ip: 216.173.115.200
- ip: 216.45.56.2
- ip: 217.138.212.194
- ip: 23.104.209.6
- ip: 23.106.161.1
- ip: 23.106.70.154
- ip: 23.160.56.155
- ip: 23.227.202.244
- ip: 23.228.120.12
- ip: 31.57.243.190
- ip: 31.57.243.29
- ip: 31.57.243.55
- ip: 31.7.63.94
- ip: 37.120.151.162
- ip: 37.120.154.98
- ip: 37.120.210.2
- ip: 38.134.148.218
- ip: 38.146.28.177
- ip: 38.170.181.10
- ip: 38.246.149.2
- ip: 38.32.68.195
- ip: 38.75.137.213
- ip: 38.92.47.118
- ip: 38.92.47.151
- ip: 38.92.47.152
- ip: 38.92.47.155
- ip: 38.92.47.85
- ip: 38.92.47.91
- ip: 43.230.201.57
- ip: 43.230.201.68
- ip: 45.126.210.144
- ip: 45.250.255.140
- ip: 45.250.255.59
- ip: 45.43.11.201
- ip: 45.59.163.23
- ip: 45.59.163.56
- ip: 45.61.128.61
- ip: 45.61.133.110
- ip: 45.61.135.4
- ip: 45.61.150.30
- ip: 45.61.160.28
- ip: 45.61.165.45
- ip: 5.42.206.34
- ip: 50.7.251.66
- ip: 51.195.140.214
- ip: 60.234.42.250
- ip: 60.249.92.67
- ip: 61.218.132.193
- ip: 61.218.138.181
- ip: 61.219.114.7
- ip: 61.221.116.109
- ip: 61.221.116.19
- ip: 61.221.116.28
- ip: 63.143.61.57
- ip: 66.187.75.186
- ip: 66.235.168.17
- ip: 66.235.168.232
- ip: 66.235.168.238
- ip: 66.235.175.109
- ip: 66.235.175.117
- ip: 67.203.7.163
- ip: 67.203.7.200
- ip: 67.203.7.205
- ip: 67.43.48.10
- ip: 67.43.49.10
- ip: 67.43.54.10
- ip: 74.222.14.74
- ip: 74.222.14.83
- ip: 80.90.48.191
- ip: 82.103.129.80
- ip: 82.223.120.180
- ip: 84.17.38.140
- ip: 85.195.119.90
- ip: 85.195.72.66
- ip: 88.218.0.78
- ip: 89.163.154.155
- ip: 89.187.161.220
- ip: 89.187.185.11
- ip: 91.207.174.99
- ip: 91.207.206.10
- ip: 94.46.23.20
- ip: 95.143.193.150
- ip: 95.179.135.133
- ip: 95.216.14.148
- url: http://154.58.204.15
- domain: lumanagi.online
- domain: powervps.net
- domain: residentialvps.com
PurpleBravo’s Targeting of the IT Software Supply Chain
Description
PurpleBravo, a North Korean state-sponsored threat group, targets software developers through fake recruitment efforts, particularly in cryptocurrency and software development sectors. Their toolkit includes BeaverTail, PyLangGhost, and GolangGhost, designed for stealing browser credentials and cryptocurrency information. The group has affected 3,136 IP addresses, mainly in South Asia and North America, compromising 20 organizations across various industries. PurpleBravo's tactics include using fictitious personas, malicious GitHub repositories, and sophisticated malware to infiltrate IT services companies, posing a significant supply-chain risk. The group shows overlap with PurpleDelta, another North Korean threat actor, sharing infrastructure and operational patterns. PurpleBravo's focus on the IT sector in South Asia presents an overlooked threat to organizations outsourcing IT services.
AI-Powered Analysis
Technical Analysis
PurpleBravo is a North Korean state-sponsored cyber espionage group focusing on the IT software supply chain, particularly targeting software developers through fake recruitment efforts. Their primary targets are individuals and organizations involved in cryptocurrency and software development sectors. The group employs a combination of social engineering tactics, including the creation of fictitious personas and malicious GitHub repositories, to lure victims into downloading malware. Their malware toolkit includes BeaverTail, PyLangGhost, and GolangGhost, which are designed to steal browser credentials and cryptocurrency-related information. The campaign has compromised over 3,100 IP addresses and 20 organizations, mainly in South Asia and North America, but the supply chain nature of the attack means that downstream organizations globally, including in Europe, could be affected. PurpleBravo shares infrastructure and operational patterns with PurpleDelta, another North Korean threat actor, indicating a coordinated effort. The group’s tactics include remote access trojans, credential theft, and leveraging software supply chain weaknesses to infiltrate IT services companies. The threat is particularly dangerous because it targets the software development lifecycle, potentially allowing attackers to insert malicious code or compromise credentials that can be used for further attacks. Despite no known public exploits, the sophistication and persistence of PurpleBravo make it a significant threat to organizations relying on outsourced IT services or involved in cryptocurrency. The campaign highlights the risks of social engineering combined with supply chain attacks, emphasizing the need for enhanced vetting and monitoring of third-party developers and repositories.
Potential Impact
For European organizations, the PurpleBravo campaign poses a significant risk primarily through the IT software supply chain, especially for those outsourcing software development or IT services to regions like South Asia. Compromise of developer credentials or insertion of malicious code into software products can lead to widespread downstream impacts, including data breaches, intellectual property theft, and disruption of critical business operations. Cryptocurrency firms in Europe are also at risk of losing sensitive wallet credentials and funds. The theft of browser credentials can facilitate further lateral movement and espionage within corporate networks. Given the group's state-sponsored nature and ties to North Korea, there is a heightened risk of espionage and sabotage targeting strategic industries. The supply chain attack vector means that even organizations not directly targeted can be affected if their suppliers are compromised. This could impact sectors such as finance, technology, and critical infrastructure. The campaign's use of sophisticated social engineering and malware tools increases the likelihood of successful infiltration, potentially leading to long-term undetected presence within networks. The medium severity rating reflects the targeted but impactful nature of the threat, with potential for significant confidentiality and integrity breaches if not mitigated.
Mitigation Recommendations
European organizations should implement rigorous vetting and continuous monitoring of third-party software developers and IT service providers, especially those located in or sourcing from South Asia. Enforce strict access controls and multi-factor authentication (MFA) for all developer and administrative accounts to reduce the risk of credential theft exploitation. Monitor for suspicious activity related to GitHub repositories and other code repositories, including unexpected code changes or repository forks from unknown contributors. Employ endpoint detection and response (EDR) solutions capable of detecting malware families like BeaverTail, PyLangGhost, and GolangGhost, focusing on browser credential theft and remote access trojans. Conduct regular security awareness training emphasizing social engineering risks, particularly fake recruitment scams and phishing attempts. Implement network segmentation to limit lateral movement if a compromise occurs. Use threat intelligence feeds to stay updated on PurpleBravo indicators and tactics, and integrate these into security information and event management (SIEM) systems for proactive detection. Regularly audit and update supply chain security policies, including software bill of materials (SBOM) to track dependencies and potential risks. Finally, establish incident response plans specifically addressing supply chain compromise scenarios to enable rapid containment and remediation.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.recordedfuture.com/research/purplebravos-targeting-it-software-supply-chain"]
- Adversary
- PurpleBravo
- Pulse Id
- 6971529d93b2db0678d1b8cc
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash1ddb90ee672c86e09168792871f6d6d00919b57d24da98d91764e292e765cd29 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip103.111.113.26 | — | |
ip103.125.234.107 | — | |
ip103.125.234.161 | — | |
ip103.125.234.210 | — | |
ip103.125.234.62 | — | |
ip103.130.145.210 | — | |
ip103.157.217.145 | — | |
ip103.16.228.16 | — | |
ip103.172.26.58 | — | |
ip103.50.33.16 | — | |
ip104.168.14.206 | — | |
ip104.223.63.2 | — | |
ip107.150.38.250 | — | |
ip107.167.244.42 | — | |
ip107.167.25.130 | — | |
ip107.189.24.80 | — | |
ip108.181.41.234 | — | |
ip125.227.75.208 | — | |
ip125.227.80.190 | — | |
ip125.227.82.145 | — | |
ip125.227.90.115 | — | |
ip135.181.7.162 | — | |
ip14.37.47.13 | — | |
ip142.214.202.2 | — | |
ip144.172.100.124 | — | |
ip144.172.100.142 | — | |
ip144.172.102.148 | — | |
ip144.172.102.21 | — | |
ip144.172.103.97 | — | |
ip144.172.104.113 | — | |
ip144.172.105.189 | — | |
ip144.172.105.235 | — | |
ip144.172.106.133 | — | |
ip144.172.106.7 | — | |
ip144.172.109.155 | — | |
ip144.172.109.98 | — | |
ip144.172.112.106 | — | |
ip144.172.95.226 | — | |
ip146.70.253.107 | — | |
ip147.124.197.138 | — | |
ip147.124.212.125 | — | |
ip147.124.213.19 | — | |
ip147.124.213.232 | — | |
ip147.124.214.129 | — | |
ip147.124.214.131 | — | |
ip147.124.214.237 | — | |
ip151.243.101.229 | — | |
ip154.58.204.15 | — | |
ip154.62.226.22 | — | |
ip155.94.199.59 | — | |
ip158.255.76.195 | — | |
ip158.62.198.177 | — | |
ip16.173.115.200 | — | |
ip162.251.62.70 | — | |
ip162.251.70.66 | — | |
ip165.140.85.105 | — | |
ip165.140.86.154 | — | |
ip165.140.86.160 | — | |
ip165.140.86.181 | — | |
ip165.140.86.227 | — | |
ip166.0.190.170 | — | |
ip167.88.61.117 | — | |
ip167.88.61.148 | — | |
ip169.38.75.87 | — | |
ip169.38.98.22 | — | |
ip172.86.109.49 | — | |
ip172.86.113.115 | — | |
ip172.86.116.90 | — | |
ip172.86.123.55 | — | |
ip172.86.73.198 | — | |
ip173.211.70.246 | — | |
ip173.254.200.134 | — | |
ip176.222.52.77 | — | |
ip178.159.7.34 | — | |
ip178.175.128.98 | — | |
ip185.135.76.115 | — | |
ip185.135.76.89 | — | |
ip188.43.33.252 | — | |
ip192.161.60.132 | — | |
ip192.74.247.161 | — | |
ip193.19.205.26 | — | |
ip194.33.45.162 | — | |
ip195.146.5.31 | — | |
ip198.2.228.23 | — | |
ip198.23.148.18 | — | |
ip202.87.221.237 | — | |
ip204.152.202.111 | — | |
ip204.44.96.131 | — | |
ip205.234.203.122 | — | |
ip206.206.127.135 | — | |
ip206.206.127.80 | — | |
ip211.21.6.136 | — | |
ip211.21.6.181 | — | |
ip211.22.147.226 | — | |
ip211.72.116.247 | — | |
ip211.72.35.109 | — | |
ip211.72.35.118 | — | |
ip211.75.42.136 | — | |
ip211.75.74.223 | — | |
ip212.81.47.217 | — | |
ip216.126.229.166 | — | |
ip216.173.115.200 | — | |
ip216.45.56.2 | — | |
ip217.138.212.194 | — | |
ip23.104.209.6 | — | |
ip23.106.161.1 | — | |
ip23.106.70.154 | — | |
ip23.160.56.155 | — | |
ip23.227.202.244 | — | |
ip23.228.120.12 | — | |
ip31.57.243.190 | — | |
ip31.57.243.29 | — | |
ip31.57.243.55 | — | |
ip31.7.63.94 | — | |
ip37.120.151.162 | — | |
ip37.120.154.98 | — | |
ip37.120.210.2 | — | |
ip38.134.148.218 | — | |
ip38.146.28.177 | — | |
ip38.170.181.10 | — | |
ip38.246.149.2 | — | |
ip38.32.68.195 | — | |
ip38.75.137.213 | — | |
ip38.92.47.118 | — | |
ip38.92.47.151 | — | |
ip38.92.47.152 | — | |
ip38.92.47.155 | — | |
ip38.92.47.85 | — | |
ip38.92.47.91 | — | |
ip43.230.201.57 | — | |
ip43.230.201.68 | — | |
ip45.126.210.144 | — | |
ip45.250.255.140 | — | |
ip45.250.255.59 | — | |
ip45.43.11.201 | — | |
ip45.59.163.23 | — | |
ip45.59.163.56 | — | |
ip45.61.128.61 | — | |
ip45.61.133.110 | — | |
ip45.61.135.4 | — | |
ip45.61.150.30 | — | |
ip45.61.160.28 | — | |
ip45.61.165.45 | — | |
ip5.42.206.34 | — | |
ip50.7.251.66 | — | |
ip51.195.140.214 | — | |
ip60.234.42.250 | — | |
ip60.249.92.67 | — | |
ip61.218.132.193 | — | |
ip61.218.138.181 | — | |
ip61.219.114.7 | — | |
ip61.221.116.109 | — | |
ip61.221.116.19 | — | |
ip61.221.116.28 | — | |
ip63.143.61.57 | — | |
ip66.187.75.186 | — | |
ip66.235.168.17 | — | |
ip66.235.168.232 | — | |
ip66.235.168.238 | — | |
ip66.235.175.109 | — | |
ip66.235.175.117 | — | |
ip67.203.7.163 | — | |
ip67.203.7.200 | — | |
ip67.203.7.205 | — | |
ip67.43.48.10 | — | |
ip67.43.49.10 | — | |
ip67.43.54.10 | — | |
ip74.222.14.74 | — | |
ip74.222.14.83 | — | |
ip80.90.48.191 | — | |
ip82.103.129.80 | — | |
ip82.223.120.180 | — | |
ip84.17.38.140 | — | |
ip85.195.119.90 | — | |
ip85.195.72.66 | — | |
ip88.218.0.78 | — | |
ip89.163.154.155 | — | |
ip89.187.161.220 | — | |
ip89.187.185.11 | — | |
ip91.207.174.99 | — | |
ip91.207.206.10 | — | |
ip94.46.23.20 | — | |
ip95.143.193.150 | — | |
ip95.179.135.133 | — | |
ip95.216.14.148 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://154.58.204.15 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainlumanagi.online | — | |
domainpowervps.net | — | |
domainresidentialvps.com | — |
Threat ID: 69715bd34623b1157cf1b863
Added to database: 1/21/2026, 11:05:55 PM
Last enriched: 1/21/2026, 11:20:44 PM
Last updated: 2/7/2026, 9:06:28 PM
Views: 630
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Technical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumThey Got In Through SonicWall. Then They Tried to Kill Every Security Tool
MediumHundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.