Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Lazarus Group Plants 192 Malicious Packages in npm and PyPI
Lazarus Group Plants 192 Malicious Packages in npm and PyPI
NEWS

Lazarus Group Plants 192 Malicious Packages in npm and PyPI

North Korea's Lazarus Group is running a fake recruitment campaign codenamed Graphalgo, planting 192 malicious packages on npm and PyPI that target...

Dylan H.

News Desk

February 12, 2026
3 min read

Lazarus Targets Developers with Fake Crypto Jobs

North Korea's Lazarus Group is running a large-scale fake recruitment campaign codenamed "Graphalgo" targeting JavaScript and Python developers with cryptocurrency-related coding challenges. Researchers have discovered 192 malicious packages on npm and PyPI that act as downloaders for a remote access trojan (RAT).


Campaign Overview

AttributeDetails
Campaign NameGraphalgo
Threat ActorLazarus Group (North Korea)
TargetJavaScript and Python developers
Malicious Packages192 (npm + PyPI)
LureCryptocurrency coding challenges and job interviews
PayloadRAT with command execution, process listing, file exfiltration
Recruitment PlatformsLinkedIn, Facebook, Reddit

How the Attack Works

Stage 1: Fake Recruitment

Lazarus operates fake blockchain and cryptocurrency companies that post job offerings on LinkedIn, Facebook, and Reddit. Targets receive messages from "recruiters" offering high-paying positions at these companies.

Stage 2: Coding Challenge

Candidates are asked to complete a cryptocurrency-related coding challenge as part of the "interview process." The challenge requires installing specific npm or PyPI packages as dependencies.

Stage 3: Malicious Packages

The required packages contain hidden malware that acts as a downloader for a RAT. Once installed, the packages:

  1. Execute a postinstall script that runs silently in the background
  2. Download a second-stage payload from attacker infrastructure
  3. Install a RAT capable of arbitrary command execution

RAT Capabilities

CapabilityDescription
Arbitrary command executionRun any command on the victim's machine
Process listingEnumerate running processes
File exfiltrationSearch for and steal files
Environment discoveryCollect system and network information
PersistenceMaintain access across reboots

Package Statistics

RegistryMalicious PackagesTotal Downloads
npm~120 packagesThousands
PyPI~72 packagesThousands
Total192 packagesUnder investigation

Packages used names designed to appear legitimate, mimicking popular cryptocurrency and blockchain libraries with slight name variations (typosquatting).


Developer Protection

  1. Verify package authenticity — Check publisher reputation, download counts, and creation dates before installing
  2. Audit dependencies — Use npm audit and pip-audit to scan for known vulnerabilities
  3. Use lockfiles — Pin exact package versions with package-lock.json and requirements.txt
  4. Be skeptical of coding challenges requiring unfamiliar packages
  5. Verify recruiters — Confirm the company and recruiter exist through official channels
  6. Run challenges in sandboxes — Use containers or VMs for coding challenges from unknown sources
  7. Monitor for unexpected network activity after installing new packages

Sources

  • The Hacker News — Lazarus Campaign Plants Malicious Packages
  • BleepingComputer — Fake Recruiters Hide Malware in Coding Challenges
  • ReversingLabs — Fake Recruiter Campaign Analysis

Related Reading

  • North Korea Deploys AI-Generated Video and ClickFix
  • North Korean Hackers Use Fake Zoom Meeting to Target Crypto
  • North Korea
#APT#North Korea#Lazarus#Supply Chain#npm#PyPI#Cryptocurrency#Malware

Related Articles

Backdoored Telnyx PyPI Package Pushes Malware Hidden in WAV Audio

Threat actors known as TeamPCP compromised the Telnyx Python package on PyPI, uploading malicious versions that conceal credential-stealing malware inside a WAV audio file using steganographic techniques.

4 min read

CanisterWorm: First Blockchain-Powered Self-Spreading Worm Hits 47 npm Packages

A novel self-propagating malware dubbed CanisterWorm uses Internet Computer Protocol smart contracts as an untakedownable C2 channel, spreading...

4 min read

North Korea's UNC4899 Breached Crypto Firm via AirDropped

North Korean threat actor UNC4899 compromised a cryptocurrency organization after a developer AirDropped a trojanized archive from a personal device to a...

4 min read
Back to all News