lazarusholic

Everyday is lazarus.dayβ

Lazarus Group Targets Developers Through NPM Packages and Supply Chain Attacks

2025-02-13, SecurityScorecard
https://securityscorecard.com/blog/lazarus-group-targets-developers-through-npm-packages-and-supply-chain-attacks/
Operation-Marstech-Mayhem-Report_021025_03.pdf, 1.7 MB
#Lazarus #MarstechMayhem #NPM

Contents

Lazarus Group Targets Developers Through NPM Packages and Supply Chain Attacks
North Korea’s Lazarus Group is evolving its tactics again. The latest campaign, dubbed Operation Marstech Mayhem, introduces an advanced implant named “Marstech1.” This malware is designed to compromise software developers and cryptocurrency wallets through manipulated open-source repositories. Unlike previous Lazarus operations, this campaign employs obfuscation techniques that make detection significantly harder.
Developers Are the Primary Target
The STRIKE team uncovered GitHub repositories associated with this attack. The attackers create fake repositories containing legitimate-looking projects embedded with obfuscated JavaScript payloads. These repositories are promoted on platforms frequented by developers, such as LinkedIn and Discord. Once a victim clones and runs the repository, the malware is executed silently in the background.
How the Malware Works
The implant, Marstech1, operates in multiple stages:
- Stage 1: A JavaScript loader connects to a command-and-control (C2) server.
- Stage 2: The loader downloads additional payloads based on the victim’s system configuration.
- …