Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

PurpleBravo’s Targeting of the IT Software Supply Chain

0
Medium
Published: Wed Jan 21 2026 (01/21/2026, 22:26:37 UTC)
Source: AlienVault OTX General

Description

PurpleBravo, a North Korean state-sponsored threat group, targets software developers through fake recruitment efforts, particularly in cryptocurrency and software development sectors. Their toolkit includes BeaverTail, PyLangGhost, and GolangGhost, designed for stealing browser credentials and cryptocurrency information. The group has affected 3,136 IP addresses, mainly in South Asia and North America, compromising 20 organizations across various industries. PurpleBravo's tactics include using fictitious personas, malicious GitHub repositories, and sophisticated malware to infiltrate IT services companies, posing a significant supply-chain risk. The group shows overlap with PurpleDelta, another North Korean threat actor, sharing infrastructure and operational patterns. PurpleBravo's focus on the IT sector in South Asia presents an overlooked threat to organizations outsourcing IT services.

AI-Powered Analysis

AILast updated: 01/21/2026, 23:20:44 UTC

Technical Analysis

PurpleBravo is a North Korean state-sponsored cyber espionage group focusing on the IT software supply chain, particularly targeting software developers through fake recruitment efforts. Their primary targets are individuals and organizations involved in cryptocurrency and software development sectors. The group employs a combination of social engineering tactics, including the creation of fictitious personas and malicious GitHub repositories, to lure victims into downloading malware. Their malware toolkit includes BeaverTail, PyLangGhost, and GolangGhost, which are designed to steal browser credentials and cryptocurrency-related information. The campaign has compromised over 3,100 IP addresses and 20 organizations, mainly in South Asia and North America, but the supply chain nature of the attack means that downstream organizations globally, including in Europe, could be affected. PurpleBravo shares infrastructure and operational patterns with PurpleDelta, another North Korean threat actor, indicating a coordinated effort. The group’s tactics include remote access trojans, credential theft, and leveraging software supply chain weaknesses to infiltrate IT services companies. The threat is particularly dangerous because it targets the software development lifecycle, potentially allowing attackers to insert malicious code or compromise credentials that can be used for further attacks. Despite no known public exploits, the sophistication and persistence of PurpleBravo make it a significant threat to organizations relying on outsourced IT services or involved in cryptocurrency. The campaign highlights the risks of social engineering combined with supply chain attacks, emphasizing the need for enhanced vetting and monitoring of third-party developers and repositories.

Potential Impact

For European organizations, the PurpleBravo campaign poses a significant risk primarily through the IT software supply chain, especially for those outsourcing software development or IT services to regions like South Asia. Compromise of developer credentials or insertion of malicious code into software products can lead to widespread downstream impacts, including data breaches, intellectual property theft, and disruption of critical business operations. Cryptocurrency firms in Europe are also at risk of losing sensitive wallet credentials and funds. The theft of browser credentials can facilitate further lateral movement and espionage within corporate networks. Given the group's state-sponsored nature and ties to North Korea, there is a heightened risk of espionage and sabotage targeting strategic industries. The supply chain attack vector means that even organizations not directly targeted can be affected if their suppliers are compromised. This could impact sectors such as finance, technology, and critical infrastructure. The campaign's use of sophisticated social engineering and malware tools increases the likelihood of successful infiltration, potentially leading to long-term undetected presence within networks. The medium severity rating reflects the targeted but impactful nature of the threat, with potential for significant confidentiality and integrity breaches if not mitigated.

Mitigation Recommendations

European organizations should implement rigorous vetting and continuous monitoring of third-party software developers and IT service providers, especially those located in or sourcing from South Asia. Enforce strict access controls and multi-factor authentication (MFA) for all developer and administrative accounts to reduce the risk of credential theft exploitation. Monitor for suspicious activity related to GitHub repositories and other code repositories, including unexpected code changes or repository forks from unknown contributors. Employ endpoint detection and response (EDR) solutions capable of detecting malware families like BeaverTail, PyLangGhost, and GolangGhost, focusing on browser credential theft and remote access trojans. Conduct regular security awareness training emphasizing social engineering risks, particularly fake recruitment scams and phishing attempts. Implement network segmentation to limit lateral movement if a compromise occurs. Use threat intelligence feeds to stay updated on PurpleBravo indicators and tactics, and integrate these into security information and event management (SIEM) systems for proactive detection. Regularly audit and update supply chain security policies, including software bill of materials (SBOM) to track dependencies and potential risks. Finally, establish incident response plans specifically addressing supply chain compromise scenarios to enable rapid containment and remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.recordedfuture.com/research/purplebravos-targeting-it-software-supply-chain"]
Adversary
PurpleBravo
Pulse Id
6971529d93b2db0678d1b8cc
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash1ddb90ee672c86e09168792871f6d6d00919b57d24da98d91764e292e765cd29

Ip

ValueDescriptionCopy
ip103.111.113.26
ip103.125.234.107
ip103.125.234.161
ip103.125.234.210
ip103.125.234.62
ip103.130.145.210
ip103.157.217.145
ip103.16.228.16
ip103.172.26.58
ip103.50.33.16
ip104.168.14.206
ip104.223.63.2
ip107.150.38.250
ip107.167.244.42
ip107.167.25.130
ip107.189.24.80
ip108.181.41.234
ip125.227.75.208
ip125.227.80.190
ip125.227.82.145
ip125.227.90.115
ip135.181.7.162
ip14.37.47.13
ip142.214.202.2
ip144.172.100.124
ip144.172.100.142
ip144.172.102.148
ip144.172.102.21
ip144.172.103.97
ip144.172.104.113
ip144.172.105.189
ip144.172.105.235
ip144.172.106.133
ip144.172.106.7
ip144.172.109.155
ip144.172.109.98
ip144.172.112.106
ip144.172.95.226
ip146.70.253.107
ip147.124.197.138
ip147.124.212.125
ip147.124.213.19
ip147.124.213.232
ip147.124.214.129
ip147.124.214.131
ip147.124.214.237
ip151.243.101.229
ip154.58.204.15
ip154.62.226.22
ip155.94.199.59
ip158.255.76.195
ip158.62.198.177
ip16.173.115.200
ip162.251.62.70
ip162.251.70.66
ip165.140.85.105
ip165.140.86.154
ip165.140.86.160
ip165.140.86.181
ip165.140.86.227
ip166.0.190.170
ip167.88.61.117
ip167.88.61.148
ip169.38.75.87
ip169.38.98.22
ip172.86.109.49
ip172.86.113.115
ip172.86.116.90
ip172.86.123.55
ip172.86.73.198
ip173.211.70.246
ip173.254.200.134
ip176.222.52.77
ip178.159.7.34
ip178.175.128.98
ip185.135.76.115
ip185.135.76.89
ip188.43.33.252
ip192.161.60.132
ip192.74.247.161
ip193.19.205.26
ip194.33.45.162
ip195.146.5.31
ip198.2.228.23
ip198.23.148.18
ip202.87.221.237
ip204.152.202.111
ip204.44.96.131
ip205.234.203.122
ip206.206.127.135
ip206.206.127.80
ip211.21.6.136
ip211.21.6.181
ip211.22.147.226
ip211.72.116.247
ip211.72.35.109
ip211.72.35.118
ip211.75.42.136
ip211.75.74.223
ip212.81.47.217
ip216.126.229.166
ip216.173.115.200
ip216.45.56.2
ip217.138.212.194
ip23.104.209.6
ip23.106.161.1
ip23.106.70.154
ip23.160.56.155
ip23.227.202.244
ip23.228.120.12
ip31.57.243.190
ip31.57.243.29
ip31.57.243.55
ip31.7.63.94
ip37.120.151.162
ip37.120.154.98
ip37.120.210.2
ip38.134.148.218
ip38.146.28.177
ip38.170.181.10
ip38.246.149.2
ip38.32.68.195
ip38.75.137.213
ip38.92.47.118
ip38.92.47.151
ip38.92.47.152
ip38.92.47.155
ip38.92.47.85
ip38.92.47.91
ip43.230.201.57
ip43.230.201.68
ip45.126.210.144
ip45.250.255.140
ip45.250.255.59
ip45.43.11.201
ip45.59.163.23
ip45.59.163.56
ip45.61.128.61
ip45.61.133.110
ip45.61.135.4
ip45.61.150.30
ip45.61.160.28
ip45.61.165.45
ip5.42.206.34
ip50.7.251.66
ip51.195.140.214
ip60.234.42.250
ip60.249.92.67
ip61.218.132.193
ip61.218.138.181
ip61.219.114.7
ip61.221.116.109
ip61.221.116.19
ip61.221.116.28
ip63.143.61.57
ip66.187.75.186
ip66.235.168.17
ip66.235.168.232
ip66.235.168.238
ip66.235.175.109
ip66.235.175.117
ip67.203.7.163
ip67.203.7.200
ip67.203.7.205
ip67.43.48.10
ip67.43.49.10
ip67.43.54.10
ip74.222.14.74
ip74.222.14.83
ip80.90.48.191
ip82.103.129.80
ip82.223.120.180
ip84.17.38.140
ip85.195.119.90
ip85.195.72.66
ip88.218.0.78
ip89.163.154.155
ip89.187.161.220
ip89.187.185.11
ip91.207.174.99
ip91.207.206.10
ip94.46.23.20
ip95.143.193.150
ip95.179.135.133
ip95.216.14.148

Url

ValueDescriptionCopy
urlhttp://154.58.204.15

Domain

ValueDescriptionCopy
domainlumanagi.online
domainpowervps.net
domainresidentialvps.com

Threat ID: 69715bd34623b1157cf1b863

Added to database: 1/21/2026, 11:05:55 PM

Last enriched: 1/21/2026, 11:20:44 PM

Last updated: 2/7/2026, 9:06:28 PM

Views: 630

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats