{"id":2444,"date":"2024-10-28T16:13:10","date_gmt":"2024-10-28T16:13:10","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/28\/beavertail-malware-resurfaces-in-malicious-npm-packages-targeting-developers\/"},"modified":"2024-10-28T16:13:10","modified_gmt":"2024-10-28T16:13:10","slug":"beavertail-malware-resurfaces-in-malicious-npm-packages-targeting-developers","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/28\/beavertail-malware-resurfaces-in-malicious-npm-packages-targeting-developers\/","title":{"rendered":"BeaverTail Malware Resurfaces in Malicious npm Packages Targeting Developers"},"content":{"rendered":"<p>\u200bThree malicious packages published to the npm registry in September 2024 have been found to contain a known malware called BeaverTail, a JavaScript downloader and information stealer linked to an ongoing North Korean campaign tracked as Contagious Interview.<br \/>\nThe Datadog Security Research team is monitoring the activity under the name Tenacious Pungsan, which is also known by the monikers\u00a0Three malicious packages published to the npm registry in September 2024 have been found to contain a known malware called BeaverTail, a JavaScript downloader and information stealer linked to an ongoing North Korean campaign tracked as Contagious Interview.<br \/>\nThe Datadog Security Research team is monitoring the activity under the name Tenacious Pungsan, which is also known by the monikers\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThree malicious packages published to the npm registry in September 2024 have been found to contain a known malware called BeaverTail, a JavaScript downloader and information stealer linked to an ongoing North Korean campaign tracked as Contagious Interview. The Datadog Security Research team is monitoring the activity under the name Tenacious Pungsan, which is also&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/10\/28\/beavertail-malware-resurfaces-in-malicious-npm-packages-targeting-developers\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">BeaverTail Malware Resurfaces in Malicious npm Packages Targeting Developers<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":2445,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2444"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=2444"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2444\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/2445"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=2444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=2444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=2444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}