In December 2023, we reported on how North Korean threat actors, particularly Jade Sleet, have been compromising supply chains through the open-source ecosystem.
One of their key tactics is the exploitation of the public npm registry to distribute malicious packages.
Despite the increased exposure and attention this issue has received through our research and that of others in the field, it is evident that these attackers remain undeterred.
Throughout the first and even second quarters of 2024, we observed the continued publication of malicious packages on NPM, which bore striking similarities to those detailed in our previous blog post.
Initially, we believed these packages to continue Jade Sleet’s campaign in late spring and early summer of 2023.
However, new information came to light, making it apparent that a new threat actor was emerging on the scene, according to a report from Checkmarx.
Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot
In a recent publication, Microsoft highlighted a new rising North Korean threat actor named Moonstone Sleet.
This actor employs various tactics, techniques, and procedures (TTPs) to target companies for financial gain and cyber espionage.
Many of these TTPs utilized by Moonstone Sleet closely resemble those employed by other North Korean threat actors.
Several Indicators of Compromise (IOCs) shared in Microsoft’s blog closely resemble those mentioned in our December blog post and recent publications by Phylum.
This shows that, in addition to delivering malicious npm packages through freelancing websites and platforms like LinkedIn, Moonstone Sleet has also been attempting to spread their malicious packages through the public npm registry.
This tactic allows them to reach a wider audience potentially and increases the likelihood of their malicious packages being installed by unsuspecting developers.
The malicious npm packages discovered during the spring and early summer of 2023, affiliated with Jade Sleet, and those found in late 2023 to early 2024, containing IOCs linking them to the Moonstone Sleet group, exhibit distinct code style and structure differences.
These differences offer interesting insights into the varying strategies used by different groups when targeting the open-source software supply chain.
Jade Sleet’s packages, discovered throughout the summer of 2023, were designed to work in pairs. Each pair was published by a separate npm user account to distribute its malicious functionality.
This approach was used to make it more challenging to detect and trace the malicious activity back to a single source.
In contrast, the packages published throughout late 2023 and early 2024 adopted a more streamlined single-package approach which would execute its payload immediately upon installation.
The malicious payload was encoded within string constants and included OS-specific code, executing only if it detected that it was running on a Windows machine.
In the second quarter of 2024, the packages increased in complexity, with the attackers adding obfuscation and having it target Linux systems as well.
The following code would be executed if the OS was detected as Linux.
The frequent publication of malicious packages on npm by North Korean threat actors underscores the persistent nature of their campaign.
By continually adapting their tactics and techniques, they aim to evade detection and enhance their odds of breaching targeted systems.
As the fight against malicious actors in the open-source ecosystem persists, collaboration and information sharing among the security community will be critical in identifying and thwarting these attacks.
We can work towards a safer and more secure open-source ecosystem for all through collective effort and proactive measures.
Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free
A recent security assessment by Shelltrail has uncovered three critical vulnerabilities in the IXON VPN…
The role of the Chief Information Security Officer (CISO) has never been more critical. As…
Digital forensics and incident response (DFIR) have become fundamental pillars of modern cybersecurity. As cyber…
In an era where digital identities have become the primary attack vector, CISOs face unprecedented…
In the ever-changing world of cybersecurity, organizations are constantly challenged to choose the right security…
In an era of digital transformation and rising cyber threats, Building Trust Through Transparency has…