North Korean Hackers Hide Malware in Public JSON Services

Related

Depthfirst Secures $40M to Advance AI-Driven Vulnerability Management

What happened Cybersecurity startup Depthfirst has raised $40 million in...

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Return Fraud Startup Pinch AI Raises $5M to Help Retailers Protect Margins

What happened Return‑fraud detection startup Pinch AI has secured $5...

Share

What happened

A North Korean group is using public JSON storage services to host and deliver malware. They approach developers with fake job offers and send demo projects that hide Base64 strings pointing to payloads stored on sites like JSON Keeper, JSONsilo, and npoint.io. The payload drops a Javascript malware named BeaverTail, which installs a Python backdoor called InvisibleFerret and can fetch extra tools.

Who is affected

Software developers and teams that review external code are most at risk. Any company that relies on code repositories, developer assessments, or third party contributions could be exposed because the delivery path looks normal and may pass basic checks.

Why CISOs should care

The attack blends into common developer workflows, which makes it hard to detect. It uses trusted services, which can bypass filters. A single compromised developer account could lead to wider access, data loss, or code tampering inside the business.

3 practical actions

  1. Review how your teams handle external code and require sandboxing for demo projects and assessments.

  2. Track and restrict requests to unfamiliar public JSON services across developer machines and build systems.

  3. Update detection rules for BeaverTail, InvisibleFerret, and related activity such as unexpected Python backdoor installs.