June's Sophisticated npm Attack Attributed to North Korea Logo

June's Sophisticated npm Attack Attributed to North Korea

0
Free
Visit Website

In June 2023, Phylum was the first to unearth a series of suspicious npm publications belonging to what appeared to be a highly targeted attack. The identified packages, published in pairs, required installation in a specific sequence, subsequently retrieving a token that facilitated the download of a final malicious payload from a remote server. A recent security alert from GitHub publicly attributes this cyber-attack—which they were investigating independently—to threat actors with strong ties to North Korean objectives. The GitHub Security AlertOn July 18, 2023 GitHub posted a security alert on their blog, sharing further insights into this attack, which they had been collaboratively investigating with npm, their subsidiary. They described it as a "low-volume social engineering campaign that targets the personal accounts of employees of technology firms." Additionally, they went on to say the following, We assess with high confidence that this campaign is associated with a group operating in support of North Korean objectives, known as Jade Sleet by Microsoft Threat Intelligence and TraderTraitor by the U.S

FEATURES

ALTERNATIVES

Repository containing MITRE ATT&CK and CAPEC datasets in STIX 2.0 for cybersecurity threat modeling.

Check the reputation of an IP address to identify potential threats.

A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.

A threat hunting tool for Windows event logs to detect APT movements and decrease the time to uncover suspicious activity.

Daily feed of bad IPs with blacklist hit scores for cybersecurity professionals to stay informed about malicious IP addresses.

Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.

LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.

NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved