Lazarus Group’s ‘Graphalgo’ Fake Recruiter Campaign Exploits GitHub, npm, and PyPI to Distribute Malware

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

The North Korean state-sponsored hacking team, Lazarus Group, has launched a sophisticated fake recruiter campaign targeting cryptocurrency developers through a malicious operation called “graphalgo.”

Active since May 2025, this coordinated attack uses fraudulent job offers to distribute remote access trojans to unsuspecting developers working with blockchain and cryptocurrency technologies.

The campaign exploits trusted open-source package repositories including GitHub, npm, and PyPI, turning legitimate development workflows into infection vectors.

Attackers approach potential victims through professional networking platforms like LinkedIn and Facebook, or by posting job advertisements on developer forums such as Reddit.

The social engineering scheme revolves around employment opportunities at fake companies involved in blockchain and cryptocurrency exchanges, most notably “Veltrix Capital.”

Victims receive coding test assignments that appear legitimate but contain hidden malicious dependencies designed to compromise their systems upon execution.

Campaign overview (Source – ReversingLabs)

What makes this campaign particularly dangerous is its modular architecture, which allows threat actors to maintain operations even when portions are exposed.

This new branch of the fake recruiter campaign has been identified by ReversingLabs researchers and named it after the first malicious package discovered in the npm repository.

Their analysis revealed that the npm package “bigmathutils” accumulated over 10,000 downloads before a weaponized version was released, demonstrating patience characteristic of state-sponsored operations.

The infection process begins when developers receive job interview tasks through GitHub repositories controlled by the fake companies.

These repositories contain coding assignments for DevOps or blockchain positions. However, embedded within project files are dependencies pointing to compromised packages hosted on npm and PyPI repositories.

Malicious dependency in one of the job tasks (Source – ReversingLabs)

When victims run or debug the interview code, package managers automatically install these malicious dependencies.

The packages include multiple obfuscation layers and encrypted payloads that download second-stage malware from command-and-control servers.

Active recruiting through direct communication (Source – ReversingLabs)

The final payload is a fully functional RAT capable of executing arbitrary commands, uploading files, listing processes, and checking for the MetaMask browser extension—indicating interest in stealing cryptocurrency funds.

Three versions of the RAT have been identified, written in JavaScript, Python, and Visual Basic Script. The malware communicates with C2 servers using token-protected authentication, preventing security researchers from analyzing server responses.

This token mechanism has been observed in other North Korean campaigns, strengthening attribution to Lazarus Group.

The presence of GMT+9 timezone timestamps in git commits and cryptocurrency-focused social engineering align with established North Korean threat actor patterns.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.