{"id":3955,"date":"2025-04-05T15:12:03","date_gmt":"2025-04-05T15:12:03","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/04\/05\/north-korean-hackers-deploy-beavertail-malware-via-11-malicious-npm-packages\/"},"modified":"2025-04-05T15:12:03","modified_gmt":"2025-04-05T15:12:03","slug":"north-korean-hackers-deploy-beavertail-malware-via-11-malicious-npm-packages","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/04\/05\/north-korean-hackers-deploy-beavertail-malware-via-11-malicious-npm-packages\/","title":{"rendered":"North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages"},"content":{"rendered":"<p>\u200bThe North Korean threat actors behind the ongoing Contagious Interview campaign are spreading their tentacles on the npm ecosystem by publishing more malicious packages that deliver the BeaverTail malware, as well as a new remote access trojan (RAT) loader.<br \/>\n&#8220;These latest samples employ hexadecimal string encoding to evade automated detection systems and manual code audits, signaling a variation\u00a0The North Korean threat actors behind the ongoing Contagious Interview campaign are spreading their tentacles on the npm ecosystem by publishing more malicious packages that deliver the BeaverTail malware, as well as a new remote access trojan (RAT) loader.<br \/>\n&#8220;These latest samples employ hexadecimal string encoding to evade automated detection systems and manual code audits, signaling a variation\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe North Korean threat actors behind the ongoing Contagious Interview campaign are spreading their tentacles on the npm ecosystem by publishing more malicious packages that deliver the BeaverTail malware, as well as a new remote access trojan (RAT) loader. &#8220;These latest samples employ hexadecimal string encoding to evade automated detection systems and manual code audits,&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/04\/05\/north-korean-hackers-deploy-beavertail-malware-via-11-malicious-npm-packages\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":3956,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/3955"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=3955"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/3955\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/3956"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=3955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=3955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=3955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}