Fake Recruiters Hide Malware in Developer Coding Tests


North Korean hackers target JavaScript and Python developers with fake job offers. They hide malware in coding challenges posted on LinkedIn, Reddit, and Facebook. Victims run the code during interviews and infect their machines with RATs.

The campaign runs since May 2025. Attackers create fake crypto firms and post jobs. Applicants get repos with malicious npm or PyPi dependencies. Running the code installs Graphalgo packages that drop remote access trojans.

ReversingLabs found 192 bad packages. They use GitHub orgs for clean repos. Malicious code lives in dependencies like “graphlib” or “bigmathutils.” One package had 10,000 downloads before takedown.

Packages delay activation to dodge scans. They check for MetaMask and use token-protected C2. Lazarus group matches the tactics, timezone, and crypto focus.

Source (Reversing Labs)

ReversingLabs states: “Threat actors simply need to take a legitimate bare-bone project and fix it up with a malicious dependency and it is ready to be served to targets.” They add: “The Graphalgo campaign abuses npm and PyPI packages to deliver malware.”

Campaign Timeline

PeriodPackage ThemeDownloads Impacted
May-Dec 2025“graph” namesHigh volume
Dec 2025+“big” names10,000+ on bigmathutils
OngoingJS/Python/VBS192 packages total ​

Infection Flow

Fake job post leads to GitHub repo. Victim runs npm install. Dependency pulls RAT payload. Malware lists processes, runs commands, steals files and MetaMask data.

RAT Capabilities

  • Process enumeration.
  • Arbitrary command execution.
  • File exfiltration.
  • Additional payload drops.

Indicators Table

TypeExamplesStatus
Packagesgraphlib fakes, bigmathutils 1.1.0Deprecated/Removed
Platformsnpm, PyPi, GitHub OrgsClean repos
C2Token-protectedCrypto-focused ​

Protection Steps

  • Verify recruiters on LinkedIn.
  • Scan dependencies with Snyk or Retire.js.
  • Run code in VMs for interviews.
  • Rotate tokens if exposed.

FAQ

Who runs Graphalgo campaign?

Lazarus (North Korea) with medium-high confidence.

How many packages found?

192 malicious npm/PyPi dependencies.

What do victims install?

RAT for process control and crypto theft.

How to avoid infection?

Check job legitimacy, scan deps, use sandboxes.

What if infected?

Rotate all creds, reinstall OS.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages