GoPlus: Beware of 26 malware packages released by North Korean hackers that can remotely download and execute Trojans.

PANews reported on March 3 that the GoPlus Chinese community issued a warning on the X platform stating that North Korean hackers released a set of 26 malware packages to the npm registry. These packages all include an installation script ("install.js"), which executes automatically during package installation, running malicious code located in "vendor/scrypt-js/version.js". This malicious code downloads and executes a Remote Access Trojan (RAT) via a malicious URL, performing actions such as keylogging, clipboard theft, browser credential collection, TruffleHog secret scanning of Git repositories, and SSH key theft. This incident is related to a North Korean hacking activity called "Famous Chollima".

Users and developers are advised to carefully check the source and security of software packages before installation to avoid the following 26 types of malware, which could lead to privacy breaches or asset losses:

  1. argonist@0.41.0
  2. bcryptance@6.5.2
  3. bee-quarl@2.1.2
  4. bubble-core@6.26.2
  5. corstoken@2.14.7
  6. daytonjs@1.11.20
  7. ether-lint@5.9.4
  8. expressjs-lint@5.3.2
  9. fastify-lint@5.8.0
  10. formmiderable@3.5.7
  11. hapi-lint@19.1.2
  12. iosysredis@5.13.2
  13. jslint-config@10.22.2
  14. jsnwebapptoken@8.40.2
  15. kafkajs-lint@2.21.3
  16. loadash-lint@4.17.24
  17. mqttoken@5.40.2
  18. prism-lint@7.4.2
  19. promanage@6.0.21
  20. sequelization@6.40.2
  21. typoriem@0.4.17
  22. undicy-lint@7.23.1
  23. uuindex@13.1.0
  24. vitetest-lint@4.1.21
  25. windowston@3.19.2
  26. zoddle@4.4.2
Share to:

Author: PA一线

This content is for market information only and is not investment advice.

Follow PANews official accounts, navigate bull and bear markets together