简体中文
繁體中文
English
Pусский
日本語
ภาษาไทย
Tiếng Việt
Bahasa Indonesia
Español
हिन्दी
Filippiiniläinen
Français
Deutsch
Português
Türkçe
한국어
العربية
Cybersecurity Alert: Lazarus Targets Developers with Malicious npm Packages
Abstract:The notorious North Korean cybercrime group, Lazarus, has recently intensified its infiltration into the npm ecosystem by deploying six new malicious packages. These packages are designed to compromise developer environments, steal credentials, extract cryptocurrency data, and install backdoors.

Attack Strategy: Infiltrating via GitHub
Lazarus employs a sophisticated method to infiltrate developer environments. The group creates and maintains GitHub repositories that host these malicious npm packages, giving them the appearance of legitimate open-source projects. This tactic increases the likelihood of developers inadvertently integrating harmful code into their workflows.
The six identified malicious packages are:
- is-buffer-validator
- yoojae-validator
- event-handle-package
- array-empty-validator
- react-event-dependency
- auth-validator
These packages mimic the names of widely-used libraries, employing a technique known as typosquatting to deceive developers into installing them.
Once these malicious packages are installed, they execute scripts that gather system environment details, including hostnames and operating systems. They systematically search browser profiles to locate and extract sensitive files, such as ‘Login Data’ from Chrome, Brave, and Firefox browsers, as well as keychain archives on macOS. Notably, these packages also target cryptocurrency wallets, specifically extracting ‘id.json’ from Solana and ‘exodus.wallet’ from Exodus wallets. The stolen data is then transmitted to command-and-control (C2) servers controlled by the attackers.
Attribution to Lazarus Group
Identifying the exact perpetrators behind cyberattacks is inherently challenging. However, the tactics, techniques, and procedures (TTPs) observed in this npm attack closely align with those previously documented in Lazarus operations. These include the use of similar obfuscation techniques, cross-platform targeting of Windows, macOS, and Linux systems, and the deployment of multi-stage payloads to maintain prolonged access to compromised systems.
Billions Stolen: Lazarus Groups Cyber Heists
Lazarus Group has orchestrated some of the most devastating cyber heists in history, targeting cryptocurrency exchanges, blockchain networks, and financial institutions. Over the past few years, the group has been responsible for stealing billions of dollars worth of digital assets. Here are some of their most significant attacks:
Bybit Exchange Hack (2025) – $1.4 Billion Stolen
One of the biggest crypto heists to date, the Bybit attack saw Lazarus exploit security vulnerabilities to steal around $1.4 billion in Ethereum. While some of the stolen funds remain traceable, a significant portion has disappeared into untraceable wallets.
WazirX Hack (2024) – $235 Million Stolen
Lazarus was initially suspected of orchestrating the $235 million hack on Indian crypto exchange WazirX in July 2024. However, later investigations led to the arrest of a suspect in India. The attack resulted in significant financial losses and heightened concerns about exchange security.
Stake.com Hack (2023) – $41 Million Stolen
The online gambling platform Stake.com was targeted in September 2023, with Lazarus reportedly draining $41 million from the site by exploiting security weaknesses.
Axie Infinity Ronin Network Hack (2022) – $620 Million Stolen
Lazarus used social engineering tactics to gain access to the private keys of Axie Infinitys Ronin Network, draining approximately $620 million worth of crypto. This remains one of the largest DeFi exploits in history.
From large-scale exchange hacks to supply chain attacks like the recent npm infiltration, Lazarus continues to refine its methods. Their ability to adapt and develop new tactics makes them one of the most persistent threats in the cybersecurity landscape. As their attacks grow in sophistication, individuals and businesses must remain vigilant against potential vulnerabilities.
Disclaimer:
The views in this article only represent the author's personal views, and do not constitute investment advice on this platform. This platform does not guarantee the accuracy, completeness and timeliness of the information in the article, and will not be liable for any loss caused by the use of or reliance on the information in the article.
Read more

Maven Trading Review: Traders Flag Funding Rule Issues, Stop-Loss Glitches & Wide Spreads
Are you facing funding issues with Maven Trading, a UK-based prop trading firm? Do you find Mavin trading rules concerning stop-loss and other aspects strange and loss-making? Does the funding program access come with higher spreads? Does the trading data offered on the Maven Trading login differ from what’s available on the popular TradingView platform? These are some specific issues concerning traders at Maven Trading. Upset by these untoward financial incidents, some traders shared complaints while sharing the Maven Trading Review. We have shared some of their complaints in this article. Take a look.

BTSE Review: Ponzi Scam, KYC Verification Hassles & Account Blocks Hit Traders Hard
Have you lost your capital with BTSE’s Ponzi scam? Did the forex broker onboard you by promising no KYC verification on both deposits and withdrawals, only to be proven wrong in real time? Have you been facing account blocks by the Virgin Islands-based forex broker? These complaints have become usual with traders at BTSE Exchange. In this BTSE review article, we have shared some of these complaints for you to look at. Read on!

Pocket Option Scam Alert: Unable to Withdraw Funds
Pocket Option Scam Alert: Not regulated claims, suspicious license score, and platform-only trading risks summarized.

Fraud Mastermind Zhimin Qian Sentenced to 11 Years for $6.6 Billion Bitcoin Ponzi Scheme
Zhimin Qian, known globally as the “Crypto Queen” or “Bitcoin Queen,” has been sentenced to 11 years and 8 months in prison for running a massive $6.6 billion cryptocurrency Ponzi scheme and laundering 61,000 Bitcoins. This landmark case is one of the largest money laundering operations in UK history.
