Article Details

Scrape Timestamp (UTC): 2024-08-06 11:20:44.740

Source: https://thehackernews.com/2024/08/north-korean-hackers-moonstone-sleet.html

Original Article Text

Click to Toggle View

North Korean Hackers Moonstone Sleet Push Malicious JS Packages to npm Registry. The North Korea-linked threat actor known as Moonstone Sleet has continued to push malicious npm packages to the JavaScript package registry with the aim of infecting Windows systems, underscoring the persistent nature of their campaigns. The packages in question, harthat-api and harthat-hash, were published on July 7, 2024, according to Datadog Security Labs. Both the libraries did not attract any downloads and were shortly pulled after a short period of time. The security arm of the cloud monitoring firm is tracking the threat actor under the name Stressed Pungsan, which exhibits overlaps with a newly discovered North Korean malicious activity cluster dubbed Moonstone Sleet. "While the name resembles the Hardhat npm package (an Ethereum development utility), its content does not indicate any intention to typosquat it," Datadog researchers Sebastian Obregoso and Zack Allen said. "The malicious package reuses code from a well-known GitHub repository called node-config with over 6,000 stars and 500 forks, known in npm as config." Attack chains orchestrated by the adversarial collective are known to disseminate bogus ZIP archive files via LinkedIn under a fake company name or freelancing websites, enticing prospective targets into executing payloads that invoke an npm package as part of a supposed technical skills assessment. "When loaded, the malicious package used curl to connect to an actor-controlled IP and drop additional malicious payloads like SplitLoader," Microsoft noted in May 2024. "In another incident, Moonstone Sleet delivered a malicious npm loader which led to credential theft from LSASS." Subsequent findings from Checkmarx uncovered that Moonstone Sleet has also been attempting to spread their packages through the npm registry. The newly discovered packages are designed to run a pre-install script specified in the package.json file, which, in turn, checks if it's running on a Windows system ("Windows_NT"), after which it contacts an external server ("142.111.77[.]196") to download a DLL file that's side loading using the rundll32.exe binary. The rogue DLL, for its part, does not perform any malicious actions, suggesting either a trial run of its payload delivery infrastructure or that it was inadvertently pushed to the registry before embedding malicious code into it. The development comes as South Korea's National Cyber Security Center (NCSC) warned of cyber attacks mounted by North Korean threat groups tracked as Andariel and Kimsuky to deliver malware families such as Dora RAT and TrollAgent (aka Troll Stealer) as part of intrusion campaigns aimed at construction and machinery sectors in the country. The Dora RAT attack sequence is noteworthy for the fact that the Andariel hackers exploited vulnerabilities in a domestic VPN software's software update mechanism to propagate the malware.

Daily Brief Summary

NATION STATE ACTIVITY // North Korean Hackers Deploy Malicious npm Packages, Targeting Windows

North Korea-linked Moonstone Sleet has continued to push malicious npm packages, aimed at Windows systems, into the JavaScript package registry.

Recent malicious packages include 'harthat-api' and 'harthat-hash,' published on July 7, 2024, but were removed shortly after with no downloads reported.

Datadog Security Labs, identifying the threat group under the moniker Stressed Pungsan, linked it with the activities of Moonstone Sleet.

Attack methods include using bogus ZIP files on LinkedIn or freelancing sites to entice downloads, executing payloads involving malicious npm packages.

Microsoft found that the npm packages could download additional payloads, such as SplitLoader, or lead to credential theft through malicious npm loaders.

Checkmarx's findings highlighted attempts by Moonstone Sleet to deploy trial payloads through the npm registry, possibly testing their infrastructure.

South Korea’s National Cyber Security Center has raised alarms regarding similar campaigns by North Korean groups targeting the construction and machinery sectors via compromised software updates.