JSON services hijacked by North Korean hackers to send malware


  • Lazarus Group used JSON storage services to host malware as part of the Contagious Interview campaign targeting developers.
  • The attackers lured their victims through fake job postings on LinkedIn, spreading BeaverTail, InvisibleFerret, and TsunamiKit malware.
  • Malware exfiltrates data, steals cryptography, and mines Monero, all while integrating into normal development workflows.

North Korean state-sponsored threat actors, part of the infamous Lazarus Group, have been seen hosting malware and other malicious code on JSON storage services.

Cybersecurity researchers NVISIO have reported seeing attackers using JSON Keeper, JSONsilo, and npoint.io in an attempt to remain invisible and persistent in their attacks.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top