North Korean Hackers Hide Malware in Public JSON Services

Related

10 CISOs to Watch in Washington

Washington remains a center of cybersecurity leadership. Federal agencies,...

10 CISOs to Watch in Memphis

Memphis has a growing cybersecurity scene. The city’s mix...

10 CISOs to Watch in San Antonio

San Antonio has grown into one of the strongest...

10 CISOs to Watch in Houston

Houston is one of the most active cybersecurity hubs...

Share

What happened

A North Korean group is using public JSON storage services to host and deliver malware. They approach developers with fake job offers and send demo projects that hide Base64 strings pointing to payloads stored on sites like JSON Keeper, JSONsilo, and npoint.io. The payload drops a Javascript malware named BeaverTail, which installs a Python backdoor called InvisibleFerret and can fetch extra tools.

Who is affected

Software developers and teams that review external code are most at risk. Any company that relies on code repositories, developer assessments, or third party contributions could be exposed because the delivery path looks normal and may pass basic checks.

Why CISOs should care

The attack blends into common developer workflows, which makes it hard to detect. It uses trusted services, which can bypass filters. A single compromised developer account could lead to wider access, data loss, or code tampering inside the business.

3 practical actions

  1. Review how your teams handle external code and require sandboxing for demo projects and assessments.

  2. Track and restrict requests to unfamiliar public JSON services across developer machines and build systems.

  3. Update detection rules for BeaverTail, InvisibleFerret, and related activity such as unexpected Python backdoor installs.