The North Korean threat actors behind the Contagious Interview campaign have shifted their approach by using JSON storage services to deliver malicious payloads. These services, including JSON Keeper, JSONsilo, and npoint.io, allow hackers to host and distribute malware through compromised code projects. This tactic marks a significant evolution in their methodologies, as they continue to refine their strategies to evade detection and successfully execute attacks.
Researchers from NVISO, including experts Bart Parys and Stef, have brought attention to this trend, indicating the need for improved security measures against such threats. The use of legitimate storage solutions complicates efforts in identifying and mitigating these risks. Organizations must remain vigilant and employ comprehensive security strategies to protect against increasingly sophisticated cyber-attacks that leverage popular technologies and services.
👉 Pročitaj original: The Hacker News