JSON services hijacked by North Korean hackers to deliver malware



  • Lazarus Group used JSON storage services to host malware in Contagious Interview campaign targeting developers
  • The attackers lured victims through fake job postings on LinkedIn, delivering BeaverTail, InvisibleFerret, and TsunamiKit malware.
  • The malware extracts data, steals cryptocurrency, and mines Monero, while integrating itself into normal development workflows.

North Korean state-sponsored threat actors, part of the infamous Lazarus Group, have been seen hosting malware and other malicious code on JSON storage services.

Cybersecurity researchers NVISIO noted that they had seen attackers using JSON Keeper, JSONsilo, and npoint.io in an attempt to remain invisible and persistent in their attacks.



Leave a Comment

Your email address will not be published. Required fields are marked *