Categories: Cyber Security News

Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers

A sophisticated cyber espionage campaign targeting software developers has infiltrated two of the world’s largest open source package repositories, with North Korea’s notorious Lazarus Group successfully deploying 234 malicious packages across npm and PyPI ecosystems.

Between January and July 2025, this state-sponsored operation exposed over 36,000 potential victims to advanced malware designed for long-term surveillance and credential theft.

The malicious packages masqueraded as legitimate developer tools, exploiting the inherent trust developers place in open source ecosystems.

Sponsored

These weaponized components functioned as espionage implants, engineered to steal sensitive secrets, profile target hosts, and establish persistent backdoors into critical infrastructure systems.

The campaign represents a strategic evolution in nation-state cyber warfare, transforming everyday development workflows into attack vectors.

Sonatype analysts identified the threat actor as the Lazarus Group, also known as Hidden Cobra, a North Korean state-sponsored collective associated with the Reconnaissance General Bureau.

This group’s decade-long criminal portfolio includes high-profile attacks such as the 2014 Sony Pictures breach, the 2016 Bangladesh Bank heist, and the devastating 2017 WannaCry ransomware outbreak.

Most recently, they orchestrated the $1.5 billion ByBit cryptocurrency theft in 2025. The attack methodology leveraged several critical vulnerabilities within open source ecosystems.

Developers routinely install packages without comprehensive verification or sandboxing protocols, while automated CI/CD systems propagate malicious dependencies throughout development pipelines without human oversight.

Sponsored

The decentralized nature of many popular projects, often maintained by just one or two individuals, creates opportunities for impersonation and compromise.

Persistence and Evasion Mechanisms

The Lazarus Group employed sophisticated persistence tactics centered on modular payload delivery and infrastructure evasion techniques.

Their malware utilized a multi-stage infection process, where initial package installation triggered dormant code that would activate during subsequent development activities.

The malicious components integrated seamlessly with legitimate development tools, making detection extremely challenging through conventional security scanning methods.

The persistent backdoors established by these packages created long-term access channels that remained undetected for extended periods, allowing continuous data exfiltration from compromised developer environments containing sensitive credentials, API tokens, and proprietary source code.

Integrate ANY.RUN TI Lookup with your SIEM or SOAR To Analyses Advanced Threats -> Try 50 Free Trial Searches

The post Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

The Alienware Area-51 9800X3D RTX 5090 Gaming PC Drops to $4,550 (Lowest Price for 5090 Prebuilt)

If you're seeking chart-topping gaming performance, then Alienware's biggest and most powerful prebuilt desktop computer…

11 minutes ago

God of War Series Casts 4 More Characters, Including Thor’s Children Modi, Magni, and Thrud

Fresh off releasing the first look at Ryan Hurst's Kratos, Prime Video has revealed four…

12 minutes ago

Death toll for US service members in Iran war at 4 as Trump projects weeks of conflict

U.S. Secretary of Defense Pete Hegseth listens to questions during a news conference at the…

17 minutes ago

Apple might use Google servers to store data for its upgraded AI Siri

Apple has asked Google to look into "setting up servers" for a new version of…

47 minutes ago

Apple might use Google servers to store data for its upgraded AI Siri

Apple has asked Google to look into "setting up servers" for a new version of…

47 minutes ago

Mastodon now has a button for sharing content from other websites

Sharing content to Mastodon is getting easier with the addition of a universal "Share to…

47 minutes ago

This website uses cookies.