
Six additional malicious npm packages were attributed to Lazarus Group in a wave of recent cyberattacks–is-buffer-validator, yoojae-validator, event-handle-package, array-empty-validator, react-event-dependency, and auth-validator.
They were designed to infiltrate development environments, steal credentials, and deploy malware. Together, they were downloaded over 330 times before being reported by The Socket Research Team.
The packages mimic trusted libraries, such as the is-buffer-validator filter for empty buffers resembling the popular is-buffer library. This deliberate similarity aims to trick developers into unknowingly downloading the malicious software.
The packages included BeaverTail malware with a secondary deployment of the InvisibleFerret backdoor, enabling long-term access to compromised systems–similar to the ‘DeceptiveDevelopment’ campaign that targeted freelance developers.
These packages targeted Windows, macOS, and Linux environments, increasing the scope of potential victims.
GitHub repositories linked to the packages further added to their veneer of legitimacy. Five of the malicious packages had associated repositories, and all were hosted under accounts resembling credible development profiles.
The malicious GitHub repositories are:
The tactics, techniques, and procedures (TTPs) observed in this campaign align with Lazarus Group’s previous operations. Key indicators include advanced obfuscation, multi-stage payload delivery, and persistent data theft mechanisms.
The malware specifically targets browser login data, cryptocurrency wallets, and sensitive system information, transmitting the data to command-and-control (C2) servers.
Examples of Lazarus's familiar methods in this campaign include the deployment of identical obfuscation and code-hiding techniques used in previous attacks, malicious script behavior resembling prior campaigns targeting supply chain vulnerabilities, and organized typosquatting strategies aimed at open-source ecosystems.