Lazarus Plants Malicious Packages in npm and PyPI Registries
North Korea's Lazarus Group targets blockchain developers with fake recruitment campaign distributing RAT malware through 36 poisoned npm and PyPI packages.
Security researchers have uncovered a fresh Lazarus Group campaign targeting blockchain and cryptocurrency developers through poisoned npm and PyPI packages. The operation, codenamed "graphalgo" after its first npm package, has been active since May 2025 and uses fake recruitment lures to trick developers into installing malware.
This campaign differs from the ClickFix-based fake interviews we covered in January. Where ClickFix tricks victims into executing PowerShell commands, graphalgo embeds the malicious payload in open-source dependencies—a more subtle supply chain attack that can persist in development environments unnoticed.
The Social Engineering Setup
Lazarus operators approach targets through LinkedIn, Facebook, and Reddit, posing as recruiters for fictitious blockchain companies. The primary cover identity is "Veltrix Capital," presented as a cryptocurrency trading firm.
The approach follows a consistent pattern:
- Recruiter contacts developer with enticing job offer
- Target receives GitHub repository containing "coding assessment"
- Repository appears legitimate but requires malicious dependencies
- Developer installs dependencies locally to complete assessment
- Malware deploys through the package manager
The deception is effective because the malicious code isn't in the interview repository itself—it's in the dependencies. A security-conscious developer reviewing the assessment code won't find anything suspicious.
Malicious Package Distribution
Researchers identified 36 packages across both registries:
npm (24 packages): graphalgo, graphorithm, graphstruct, graphlibcore, netstruct, graphnetworkx, terminalcolor256, graphkitx, graphchain, graphflux, graphorbit, graphnet, graphhub, terminal-kleur, graphrix, bignumx, bignumberx, bignumex, bigmathex, bigmathlib, bigmathutils, graphlink, bigmathix, graphflowx
PyPI (12 packages): graphalgo, graphex, graphlibx, graphdict, graphflux, graphnode, graphsync, bigpyx, bignum, bigmathex, bigmathix, bigmathutils
One package—bigmathutils—accumulated more than 10,000 downloads after its initial, non-malicious version was published. The malicious payload was added in a subsequent update, catching existing users in the trap.
RAT Capabilities
The packages act as first-stage loaders that deploy a remote access trojan from attacker-controlled infrastructure. The RAT provides:
- System information gathering
- File and directory enumeration
- Process listing
- File operations (create, rename, delete, upload/download)
- MetaMask browser extension detection
- Command execution via remote server
The MetaMask targeting is notable—Lazarus has consistently pursued cryptocurrency theft as a revenue stream for North Korean state operations. We covered their $2 billion in cryptocurrency theft during 2025.
Token-Based C2 Architecture
The campaign uses a token-based command-and-control mechanism that researchers note is distinctive to Lazarus operations:
- Infected system registers with C2 server
- Server responds with authentication token
- Subsequent communications require valid token
- Only registered infected systems can communicate with C2
"The token-based approach is a similarity [to 2023 campaigns] and has not been used by other actors in malware hosted on public package repositories as far as we know," researchers noted.
This fingerprint connects graphalgo to Jade Sleet (also tracked as TraderTraitor and UNC4899)—a North Korean cluster previously observed using identical C2 mechanisms.
Developer Protections
Organizations with blockchain or cryptocurrency development teams should:
- Audit installed packages against the list above and remove any matches
- Review dependency sources before installing packages for "assessments"
- Train developers to recognize recruitment-based social engineering
- Enable package lockfiles to prevent unexpected dependency updates
- Use organizational package proxies that can scan for known-malicious packages
The supply chain attack vector remains one of Lazarus's most effective techniques. For deeper background on their operations, see our guide to North Korea's cyber operations.
Why This Matters
North Korean threat actors have refined the fake recruitment playbook over several years. The graphalgo campaign shows continued investment in supply chain attacks specifically targeting the cryptocurrency sector.
The 10,000+ downloads on bigmathutils before it turned malicious demonstrates the risk of dependency trust. Developers assume packages in official registries are safe. Lazarus exploits that assumption by publishing legitimate-looking packages, building download numbers, then adding malicious updates.
Related Articles
Lazarus Weaponizes Fake Job Interviews With ClickFix Malware
North Korean APT-Q-1 now combines fraudulent cryptocurrency job postings with ClickFix social engineering to deploy GolangGhost backdoor and BeaverTail stealer.
Jan 7, 2026North Korea Uses Deepfake Zoom Calls in Crypto Heists
Google Mandiant exposes UNC1069's use of AI-generated deepfake video, compromised executive accounts, and ClickFix attacks to deploy macOS malware against cryptocurrency firms.
Feb 12, 2026North Korea's Cyber Army: A Lazarus Group Profile
DPRK hackers stole $2B in cryptocurrency in 2025 alone. Understanding Lazarus Group's operations helps defend against state-sponsored financial theft.
Jan 10, 2026North Korea Stole $2.02 Billion in Cryptocurrency During 2025
DPRK-affiliated threat actors dominated crypto theft in 2025, accounting for 76% of exchange compromises with cumulative theft now exceeding $6.75 billion.
Dec 18, 2025