SDF Chatter
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
expertmadman@sh.itjust.works to netsec - Network Security@discuss.tchncs.deEnglish · 2 years ago

Malicious NPM packages attributed to North Korean state actors

blog.phylum.io

external-link
message-square
2
fedilink
  • cross-posted to:
  • programming@programming.dev
  • netsec@lemmy.world
  • secops@lemmy.world
0
external-link

Malicious NPM packages attributed to North Korean state actors

blog.phylum.io

expertmadman@sh.itjust.works to netsec - Network Security@discuss.tchncs.deEnglish · 2 years ago
message-square
2
fedilink
  • cross-posted to:
  • programming@programming.dev
  • netsec@lemmy.world
  • secops@lemmy.world
June’s Sophisticated npm Attack Attributed to North Korea
blog.phylum.io
external-link
In June 2023, Phylum was the first to unearth a series of suspicious npm publications belonging to what appeared to be a highly targeted attack. The identified packages, published in pairs, required installation in a specific sequence, subsequently retrieving a token that facilitated the download of a final malicious payload
  • dubbel@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 years ago

    This attack does seem to be on the simpler side technically.

    NK recruits their hackers straight from the elite-ish high schools, trains them in computer science, and send them abroad with the objective to earn money through any technical means. How exactly they do it is pretty much up to them.

    I can highly recommend the podcast “The Lazarus Heist” if you want to know more about NKs state hacking ventures: http://www.bbc.co.uk/programmes/w13xtvg9

    RSS address: https://podcasts.files.bbci.co.uk/w13xtvg9.rss

netsec - Network Security@discuss.tchncs.de

netsec@discuss.tchncs.de

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !netsec@discuss.tchncs.de

This is the netsec Community, a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise - to provide value to security practitioners, students, researchers, and hackers everywhere.

Content Guidelines:

  • Content should focus on the “How”.
  • Always try to link to the original source.
  • Titles should provide context.
  • Ask Questions with a “[Question]” prefix in the Title.
  • Hiring Posts must go in the [Hiring] (stickied) Threads.
  • Commercial advertisement is discouraged.

Discussion Guidelines:

  • Don’t create unnecessary conflict.
  • No trolling allowed, limit the use of jokes and memes.
  • Don’t complain about content being a PDF.
  • Be nice to each other, everybody started somewhere.

Prohibited Content:

  • No populist news articles (CNN, BBC, FOX, etc)
  • No curated lists.
  • No social media posts (Facebook, Twitter, etc).
  • No image-only/video-only posts.
  • No livestreams.
  • No Tech Support requests.
  • No paywalled/regwalled content (use archive.is if possible?)
  • No commercial advertisement.
  • No crowdfunding posts.
  • No personally identifiable information.
  • No doxxing, and no harrassment of any kind.
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1 user / day
  • 1 user / week
  • 1 user / month
  • 17 users / 6 months
  • 2 local subscribers
  • 427 subscribers
  • 17 Posts
  • 5 Comments
  • Modlog
  • mods:
  • cookiengineer@discuss.tchncs.de
  • BE: 0.19.8
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org