● LIVE   Breaking News & Analysis
296626 Stack
2026-05-02
Cybersecurity

North Korean Hackers Weaponize AI-Recommended npm Package in Sophisticated Supply Chain Attack

North Korean hackers use AI-recommended npm malware and fake companies to deliver RATs, highlighting supply chain risks from generative AI. Researchers uncover @validate-sdk/v2 package.

Overview of the Attack

Cybersecurity researchers have uncovered a malicious npm package that was apparently inserted into development pipelines through an AI recommendation. The package, named @validate-sdk/v2, was listed on the npm registry as a utility software development kit (SDK) for hashing, validation, encoding/decoding, and secure random generation. However, its true purpose was to compromise systems and deliver remote access trojans (RATs) linked to threat actors from North Korea.

North Korean Hackers Weaponize AI-Recommended npm Package in Sophisticated Supply Chain Attack
Source: feeds.feedburner.com

The discovery highlights a worrying trend: the weaponization of generative AI models, like Anthropic's Claude Opus, to suggest harmful dependencies. In this case, the LLM proposed the package as a legitimate dependency for a project, tricking developers into inadvertently integrating malware into their codebase.

Technical Details of the Malicious Package

How the Package Works

The @validate-sdk/v2 package appeared to offer standard cryptographic and encoding functions. In reality, it contained obfuscated code that, when invoked, established a backdoor connection to command-and-control (C2) servers operated by the attackers. The payload included capabilities to:

  • Execute arbitrary shell commands
  • Exfiltrate sensitive files and environment variables
  • Install additional malware, including RATs
  • Persistence mechanisms to survive system reboots

Fake Firms and Distribution Networks

To increase credibility, the threat actors created fake software companies that appeared to maintain the package. These entities had professional-looking websites, social media profiles, and even code contributions to other open-source projects — all designed to mask malicious activity. The attackers also used multiple npm accounts to publish the package under different names, making it harder for automated scanning tools to flag all variants.

Attribution to North Korean Threat Actors

Researchers attribute this campaign to a known North Korean APT group, often referred to as Lazarus Group or its sub-clusters like BlueNoroff. The group has a long history of targeting cryptocurrency exchanges, financial institutions, and software supply chains. Indicators of compromise (IoCs) tie the C2 infrastructure to previous DPRK-linked operations, including the use of similar encryption routines and drop zones.

The use of AI to suggest malicious npm packages is a novel evolution in their tactics. By leveraging large language models, the attackers can automate the creation of plausible dependencies and inject them into development workflows without direct manual intervention. This approach reduces the likelihood of immediate detection and amplifies the scale of potential infections.

North Korean Hackers Weaponize AI-Recommended npm Package in Sophisticated Supply Chain Attack
Source: feeds.feedburner.com

Broader Implications for Software Supply Chain Security

AI as an Attack Vector

The incident underscores the dual-use nature of generative AI. While tools like Claude Opus can accelerate development, they can also be manipulated to recommend malicious code if the training data or user queries are poisoned. Developers must treat AI-suggested packages with the same scrutiny as any other third-party code, especially when the model is not sandboxed or audited for security.

Recommendations for Development Teams

To mitigate similar risks, organizations should adopt the following practices:

  1. Use private registries: Consider using an internal npm proxy or registry that vets all packages before allowing installation.
  2. Implement software composition analysis (SCA): Automatically scan dependencies for known vulnerabilities and suspicious behavior.
  3. Verify publisher identity: Check the npm package page for verified ownership, repository links, and community reputation.
  4. Monitor C2 indicators: Integrate threat intelligence feeds that include IoCs from DPRK-linked campaigns.
  5. Restrict AI model usage: When using LLMs for code generation, ensure the model is not exposed to external, untrusted data sources that could influence recommendations.

Conclusion

The discovery of @validate-sdk/v2 marks a significant escalation in supply chain attacks, combining AI manipulation with traditional malware delivery. North Korean threat actors continue to adapt, leveraging fake firms, npm packages, and remote access trojans to infiltrate high-value targets. The security community must remain vigilant, adopt layered defenses, and reconsider the trust placed in AI-generated code suggestions.

For the latest developments and IoCs, readers are encouraged to consult official advisories from npm and cybersecurity vendors tracking this campaign.