InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: North Korean hackers turn JSON service into covert malware delivery channel
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > North Korean hackers turn JSON service into covert malware delivery channel
Technology

North Korean hackers turn JSON service into covert malware delivery channel

November 14, 2025 3 Min Read
Share

The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage their malicious payloads.

NVISO researchers Bart Parys, Stef Collart, and Efstratios Lontzetidis said in a Thursday report that “attackers have recently been using JSON storage services such as JSON Keeper, JSONsilo, and npoint.io to host and distribute malware from trojanized code projects.”

The campaign essentially approaches potential targets on professional networking sites such as LinkedIn under the pretext of conducting a job evaluation or collaborating on a project, and as part of this, they are instructed to download demo projects hosted on platforms such as GitHub, GitLab, and Bitbucket.

In one such project discovered by NVISO, a file named “server/config/.config.env” contained a Base64-encoded value disguised as an API key, but was actually found to be a URL to a JSON storage service, such as JSON Keeper, where the next stage payload was stored in an obfuscated format.

The payload is a JavaScript malware known as BeaverTail that has the ability to collect sensitive data and drop a Python backdoor called InvisibleFerret. The backdoor’s functionality has remained largely unchanged since it was first documented by Palo Alto Networks in late 2023, but one notable change is that it obtains an additional payload from Pastebin called TsunamiKit.

It is worth noting that the use of TsunamiKit as part of the Contagious Interview campaign was highlighted by ESET in September 2025, and that attack also dropped Tropidoor and AkdoorTea. This toolkit is capable of system fingerprinting, data collection, and fetching additional payloads from hardcoded .onion addresses that are currently offline.

See also  React2Shell exploit delivers crypto miners and new malware across multiple sectors

“It is clear that the attackers behind Contagious Interviews are not far behind and are attempting to cast a very wide net to compromise potentially interested (software) developers, resulting in the exposure of sensitive data and cryptocurrency wallet information,” the researchers concluded.

“The use of legitimate websites such as JSON Keeper, JSON Silo, and npoint.io, as well as code repositories such as GitLab and GitHub, highlights the attacker’s motivations and continued attempts to operate covertly and blend in with normal traffic.”

Share This Article
Twitter Copy Link
Previous Article Get a free Steam key for Fellowship, a dungeon-diving RPG that combines the best of WoW and Diablo 4. Get a free Steam key for Fellowship, a dungeon-diving RPG that combines the best of WoW and Diablo 4.
Next Article Foul-mouthed, cocky and insightful: What you need to know about the former Newsom aide embroiled in corruption investigation Foul-mouthed, cocky and insightful: What you need to know about the former Newsom aide embroiled in corruption investigation

You Might Also Like

Add Google Pixel 10 C2PA support to verify the reliability of AI-generated media
Technology

Add Google Pixel 10 C2PA support to verify the reliability of AI-generated media

3 Min Read
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
Technology

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

5 Min Read
From Log4j to IIS, Chinese hackers turn legacy bugs into global spying tools
Technology

From Log4j to IIS, Chinese hackers turn legacy bugs into global spying tools

8 Min Read
Experts confirm that JS#SMUGGLER uses compromised sites to deploy NetSupport RAT
Technology

Experts confirm that JS#SMUGGLER uses compromised sites to deploy NetSupport RAT

6 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?