North Korean Hackers Hide Malware in Public JSON Services

Related

Cybersecurity Leaders to Watch: Louisiana Healthcare

Louisiana’s healthcare sector depends on cybersecurity leaders who can...

Anthropic Unveils Claude Mythos to Find Critical Software Flaws Before Attackers Do

What happened Anthropic unveiled Claude Mythos Preview as the model...

Microsoft Commits $10 Billion to Expand AI and Cybersecurity Infrastructure in Japan

What happened Microsoft announced a $10 billion investment to expand...

Share

What happened

A North Korean group is using public JSON storage services to host and deliver malware. They approach developers with fake job offers and send demo projects that hide Base64 strings pointing to payloads stored on sites like JSON Keeper, JSONsilo, and npoint.io. The payload drops a Javascript malware named BeaverTail, which installs a Python backdoor called InvisibleFerret and can fetch extra tools.

Who is affected

Software developers and teams that review external code are most at risk. Any company that relies on code repositories, developer assessments, or third party contributions could be exposed because the delivery path looks normal and may pass basic checks.

Why CISOs should care

The attack blends into common developer workflows, which makes it hard to detect. It uses trusted services, which can bypass filters. A single compromised developer account could lead to wider access, data loss, or code tampering inside the business.

3 practical actions

  1. Review how your teams handle external code and require sandboxing for demo projects and assessments.

  2. Track and restrict requests to unfamiliar public JSON services across developer machines and build systems.

  3. Update detection rules for BeaverTail, InvisibleFerret, and related activity such as unexpected Python backdoor installs.