A cyber campaign known as Contagious Interview, believed to be linked to North Korean threat actors, is expanding its reach by planting malicious packages across several major developer ecosystems.
Security researchers have discovered that the attackers are disguising malware as legitimate developer tools in platforms used by Go, Rust, PHP, Python, and JavaScript communities. These packages appear harmless on the surface but are actually designed to act as loaders for more advanced malware.
A Growing Supply Chain Threat
The campaign is notable for how widely it spreads across different programming environments. Malicious packages have been identified in repositories such as npm, PyPI, Go modules, Rust crates, and Packagist.
Instead of triggering suspicious behavior during installation, the malware is hidden within normal-looking functions. This makes it harder for developers to detect, as the code blends in with the expected functionality of the package.
What the Malware Does
Once activated, the malicious code downloads a second-stage payload tailored to the victim’s operating system. This payload includes both:
- Information-stealing capabilities
- Remote access tools (RAT features)
The malware targets sensitive data such as:
- Browser-stored credentials
- Password manager data
- Cryptocurrency wallet information
In some cases, especially on Windows systems, the payload is much more advanced. It can:
- Execute system commands
- Record keystrokes
- Extract browser data
- Upload files to attacker-controlled servers
- Install remote access tools like AnyDesk
- Download additional malicious modules
Stealth Techniques Used
One of the most dangerous aspects of this campaign is how carefully the malware is hidden. Instead of obvious malicious scripts, the code is embedded inside functions that developers would normally trust.
For example, logging or debugging functions may contain hidden instructions that activate the malware. Because these functions appear legitimate, they are unlikely to raise suspicion during code review.
Scale of the Operation
Researchers have identified over 1,700 malicious packages linked to this campaign since early 2025, highlighting its scale and persistence.
This widespread activity suggests a coordinated effort to compromise developer environments and gain access to larger systems through software supply chains.
Links to Broader North Korean Operations
This campaign is part of a larger pattern of activity tied to financially motivated North Korean groups. These actors have also been linked to:
- Hijacking trusted software packages
- Running social engineering campaigns on platforms like LinkedIn, Telegram, and Slack
- Impersonating services such as Zoom and Microsoft Teams
In some attacks, victims are tricked into joining fake meetings, which then deliver malware through deceptive prompts.
A Patient and Strategic Approach
Unlike typical cyberattacks that act quickly, this campaign often delays its actions after initial access. The malware may remain inactive for a period, allowing attackers to avoid detection and gather more valuable data over time.
This slow, calculated approach increases the effectiveness of the attack and makes it harder for organizations to identify when a breach has occurred.
Why This Matters
The expansion of Contagious Interview into multiple open-source ecosystems highlights a growing risk in modern software development.
Developers often trust third-party packages to speed up their work. However, this trust can be exploited, turning widely used tools into entry points for cyberattacks.
Final Insight
This campaign shows how supply chain attacks are evolving. By targeting developers directly and embedding malware into trusted tools, attackers can gain access to entire systems and organizations.
For developers and organizations alike, reviewing dependencies carefully and monitoring unusual behavior is now more critical than ever.

