{"id":8751,"date":"2025-11-15T08:01:53","date_gmt":"2025-11-15T08:01:53","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=8751"},"modified":"2025-11-15T08:01:53","modified_gmt":"2025-11-15T08:01:53","slug":"north-korean-hackers-flip-json-companies-into-covert-malware-supply-channels","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=8751","title":{"rendered":"North Korean Hackers Flip JSON Companies into Covert Malware Supply Channels"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Nov 14, 2025<\/span><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><\/span><span class=\"p-tags\">Malware \/ Menace Intelligence<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhezv9r6ClrAlk-BAArf2qit1LLkCBtsnc22v9EJEuoGm8ZQfYXSoQJdoTrKRMDlQMCkhtTbaHx3mCh86eh1NHLPkFQQGDQ33zkO0W44RQac1TFZhD2-kKTk4WZIEWJzYrsGHjGEzSOEvFiZGpQa35Fli1w5rqbjrOdq3QtvpUPRl28X3vv1urOJpV4s-th\/s790-rw-e365\/json.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhezv9r6ClrAlk-BAArf2qit1LLkCBtsnc22v9EJEuoGm8ZQfYXSoQJdoTrKRMDlQMCkhtTbaHx3mCh86eh1NHLPkFQQGDQ33zkO0W44RQac1TFZhD2-kKTk4WZIEWJzYrsGHjGEzSOEvFiZGpQa35Fli1w5rqbjrOdq3QtvpUPRl28X3vv1urOJpV4s-th\/s790-rw-e365\/json.jpg\" alt=\"Malware Delivery Channels\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" title=\"Malware Delivery Channels\"\/><\/a><\/div>\n<p>The North Korean risk actors behind the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2025\/10\/north-korean-hackers-combine-beavertail.html\" rel=\"noopener\" target=\"_blank\">Contagious Interview<\/a> marketing campaign have as soon as once more tweaked their techniques through the use of JSON storage providers to stage malicious payloads.<\/p>\n<p>&#8220;The risk actors have just lately resorted to using JSON storage providers like JSON Keeper, JSONsilo, and npoint.io to host and ship malware from trojanized code initiatives, with the lure,&#8221; NVISO researchers Bart Parys, Stef Collart, and Efstratios Lontzetidis <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blog.nviso.eu\/2025\/11\/13\/contagious-interview-actors-now-utilize-json-storage-services-for-malware-delivery\/\" rel=\"noopener\" target=\"_blank\">mentioned<\/a> in a Thursday report.<\/p>\n<p>The marketing campaign primarily entails approaching potential targets on skilled networking websites like LinkedIn, both beneath the pretext of conducting a job evaluation or collaborating on a mission, as a part of which they&#8217;re instructed to obtain a demo mission hosted on platforms like GitHub, GitLab, or Bitbucket.<\/p>\n<p>In a single such mission noticed by NVISO, it has been discovered {that a} file named &#8220;server\/config\/.config.env&#8221; accommodates a Base64-encoded worth that masquerades as an API key, however, in actuality, is a URL to a JSON storage service like JSON Keeper the place the next-stage payload is saved in obfuscated format.<\/p>\n<div class=\"dog_two clear\"><center class=\"cf\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.uk\/endpoint-protect-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"CIS Build Kits\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi_HDUlvbnYoGKWPtfjTL83IuUQ73P6igcLnrsVdRjU2sVKjgD6kcX1QX3psmxbKnQ-GfeZ5xCNgnJF64an1ZS4C9mxkNAfVoSaNVMTGdlCMv4nchoUdLGCDbdB6BQWiRScizTQjINO1DArRQdcgzs5CbapyRNjTVLX_RBZ4eS9Kg3iB7UkazuU0e5YlPLZ\/s728-e100\/sem-d.png\" width=\"729\" height=\"91\"\/><\/a><\/center><\/div>\n<p>The payload is a JavaScript malware often called BeaverTail, which is able to harvesting delicate information and dropping a Python backdoor known as InvisibleFerret. Whereas the performance of the backdoor has remained largely unchanged from when it was <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2023\/11\/north-korean-hackers-pose-as-job.html\" rel=\"noopener\" target=\"_blank\">first documented<\/a> by Palo Alto Networks in late 2023, one notable change entails fetching a further payload dubbed TsunamiKit from Pastebin.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiv2PKLgWoYthoCliP7vCNaFmp_cIbB9h5dIa9oPDTajcrEx95kgZCPKMAz72vrq6TbU7zfPMVfUMICktY0C9Bo9idP2u-XXF0Dik0n66wFrBDR_4GL_1c2kafYzAEH9ly4ww3rhsV1K79dTxYoo3VHZj3uKylv8eoeUcu4z0t4f96koEt1VuKhSRETJSbr\/s790-rw-e365\/nn.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiv2PKLgWoYthoCliP7vCNaFmp_cIbB9h5dIa9oPDTajcrEx95kgZCPKMAz72vrq6TbU7zfPMVfUMICktY0C9Bo9idP2u-XXF0Dik0n66wFrBDR_4GL_1c2kafYzAEH9ly4ww3rhsV1K79dTxYoo3VHZj3uKylv8eoeUcu4z0t4f96koEt1VuKhSRETJSbr\/s790-rw-e365\/nn.png\" alt=\"\" border=\"0\" data-original-height=\"648\" data-original-width=\"731\"\/><\/a><\/div>\n<p>It is price noting that use of TsunamiKit as a part of the Contagious Interview marketing campaign was <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.com\/2025\/09\/north-korean-hackers-use-new-akdoortea.html\" rel=\"noopener\" target=\"_blank\">highlighted<\/a> by ESET again in September 2025, with the assaults additionally dropping Tropidoor and AkdoorTea. The toolkit is able to system fingerprinting, information assortment, and fetching extra payloads from a hard-coded .onion deal with that is at present offline.<\/p>\n<p>&#8220;It is clear that the actors behind Contagious Interview are usually not lagging behind and are attempting to forged a really extensive internet to compromise any (software program) developer which may appear attention-grabbing to them, leading to exfiltration of delicate information and crypto pockets data,&#8221; the researchers concluded.<\/p>\n<p>&#8220;The usage of respectable web sites corresponding to JSON Keeper, JSON Silo and npoint.io, together with code repositories corresponding to GitLab and GitHub, underlines the actor&#8217;s motivation and sustained makes an attempt to function stealthily and mix in with regular site visitors.&#8221;<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>\ue802Nov 14, 2025\ue804Ravie LakshmananMalware \/ Menace Intelligence The North Korean risk actors behind the Contagious Interview marketing campaign have as soon as once more tweaked their techniques through the use of JSON storage providers to stage malicious payloads. &#8220;The risk actors have just lately resorted to using JSON storage providers like JSON Keeper, JSONsilo, and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8753,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[5894,3867,1529,554,6438,4714,216,4713,190,2416],"class_list":["post-8751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-channels","tag-covert","tag-delivery","tag-hackers","tag-json","tag-korean","tag-malware","tag-north","tag-services","tag-turn"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/8751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8751"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/8751\/revisions"}],"predecessor-version":[{"id":8752,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/8751\/revisions\/8752"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/8753"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-14 08:31:44 UTC -->