North Korean hackers attack crypto developers using open-source software

The ‘Contagious Interview’ campaign by North Korean hackers utilizes booby-trapped code packages on npm to target crypto developers, stealing sensitive credentials and wallet keys.

Experts emphasize the risks posed by state-sponsored attacks on software supply chains, urging developers to be vigilant in securing their projects against such threats.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

More posts