Categories: Cyber Security News

Exploiting Code Hosting Platforms to Deliver Malware Through Manipulated JSON Storage Services and Code Repositories

A recent investigation by NVISO has uncovered a new wave in the ongoing “Contagious Interview” campaign, linked to DPRK‑aligned threat actors, that leverages legitimate JSON storage services such as JSON Keeper, JSONsilo, and npoint.io to deliver malware from trojanized code repositories.

The campaign, traced back to at least 2023, continues to target software developers, particularly in cryptocurrency and Web3 sectors, under the guise of fake technical interviews.

Luring Developers with Fake Job Projects

The operation begins when fake recruiters approach developers on professional platforms like LinkedIn, posing as representatives of tech or other industries.

The victim is persuaded to download a so‑called “demo” project from GitLab or GitHub, allegedly part of an interview test. Upon inspection, these demo repositories appear functional, often representing real‑estate or Web3 applications built using Node.js.

Hidden in these repositories is a configuration file, typically stored at server/config/.config.env. This file contains a base64‑encoded variable masked as an API key. However, once decoded, it reveals a URL hosted on one of the abused JSON storage platforms.

The retrieved JSON actually contains obfuscated JavaScript, which the Node.js application automatically imports and executes as a legitimate library call.

This obfuscated script ultimately leads to the download of BeaverTail, an infostealer that collects browser data, cryptocurrency wallet credentials, keychain files, and other sensitive documents before delivering the next‑stage payload.

Modular Infection via InvisibleFerret and Tsunami

The second‑stage malware, InvisibleFerret, is a Python‑based modular RAT previously detailed by Palo Alto Networks. NVISO analysis confirms it now includes new functionality to fetch components from Pastebin.

The module internally referenced as “pow” decodes up to 1,000 Pastebin URLs encrypted with an XOR key (“!!!HappyPenguin1950!!!”), further transforming and validating them through RSA signatures before downloading additional payloads.

Overview of the Contagious Interview malware campaign, illustrating the stages from initial contact to malware delivery.

One of these payloads, named Tsunami, performs extensive system fingerprinting, adds Windows Defender exclusions, and creates scheduled tasks for persistence.

A variant observed on VirusTotal also integrated a TOR client to contact a hard‑coded .onion command‑and‑control domain, though the server was offline at the time of analysis.

Abusing Legitimate Developer Infrastructure

NVISO identified that the actors used multiple layers of legitimate infrastructure, including JSON storage APIs, GitLab repositories, and the Railway platform, to conceal payload transfers. Representatives of the abused services have been notified and are actively removing malicious data.

The report reinforces earlier warnings: developers should never execute code provided during unsolicited interviews without sandbox inspection, and should treat configuration variables and embedded URLs as potential infection vectors.

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Exploiting Code Hosting Platforms to Deliver Malware Through Manipulated JSON Storage Services and Code Repositories appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

GameStop Makes $55.5 Billion Offer to Buy eBay

GameStop has announced it has made a $55.5 billion offer to buy eBay at $125.00…

20 minutes ago

Chuck Jones’ The Dot and the Line Celebrates Geometry & Hard Work: An Oscar-Winning Animation (1965)

The animated short above, The Dot and the Line, directed by the great Chuck Jones…

1 hour ago

Star Wars Video Games Are On Sale for May the 4th, Here’s the Best Deals

"Hello there!" - Star Wars games are on sale as part of May the 4th…

1 hour ago

Threat Actors Use AI to Automate 0-Day Discovery and Exploitation at Machine Speed

The way cyberattacks are launched has fundamentally changed. Threat actors are no longer spending months…

2 hours ago

FreeBSD DHCP Client Vulnerability Enables Remote Code Execution as Root

The FreeBSD Project has released a critical security advisory addressing a severe flaw in its…

2 hours ago

Email Bombing and Fake IT Support Calls Fuel New Microsoft Teams Phishing Attacks

A new wave of cyberattacks is targeting employees through a combination of inbox flooding and…

2 hours ago

This website uses cookies.