Researchers at ReversingLabs have uncovered a new malicious software supply chain campaign, dubbed “graphalgo,” attributed to the North Korea-linked Lazarus Group. Active since May 2025, the operation targets JavaScript and Python developers through fake cryptocurrency job offers. Attackers pose as recruiters for a fabricated blockchain firm, Veltrix Capital, using polished websites, GitHub organizations, and AI-generated content to build credibility. Victims are approached on LinkedIn, Facebook, Reddit, and other platforms and invited to complete coding “interview tasks.” These GitHub repositories appear legitimate but secretly rely on malicious npm or PyPI packages. When candidates install and run the projects, hidden dependencies execute malicious code. In some cases, packages initially appear clean to gain trust before attackers push harmful updates. One npm package, bigmathutils, reportedly exceeded 10,000 downloads before being weaponized. The campaign follows a modular, multi-stage design. Fake companies and domains are quickly replaced if exposed, while backend infrastructure and malware components are reused. Early packages mimicked popular libraries, while later versions adopted more subtle naming and delayed payload delivery to evade detection. Once activated, the malware deploys a remote access trojan (RAT) capable of file theft, command execution, and process manipulation. It uses token-protected command-and-control communications and checks for cryptocurrency wallets such as MetaMask, indicating financial motivations. Researchers cite recurring tactics—fake interviews, staged payloads, encrypted communications, and delayed updates—as consistent with Lazarus operations, underscoring the campaign’s sophistication and ongoing risk to the open-source ecosystem.
Cloud Imperium Games (CIG), the developer behind Star Citizen and Squadron 42, has disclosed a cybersecurity incident that occurred in January 2026. The California-based studio, fo...
The University of Hawaii (UH) has confirmed a major cybersecurity incident in which a ransomware group breached systems within the UH Cancer Center’s Epidemiology Division and st...
LexisNexis Legal & Professional has confirmed that hackers breached its servers and accessed a portion of customer and business information, following the leak of approximately 2GB...