Thursday, March 5, 2026

North Korean Cyberattackers Target CI/CD Pipelines to Steal Critical Data

In a concerning escalation of the global cybersecurity landscape, researchers at Sonatype have uncovered a sophisticated espionage campaign launched by the North Korea-backed Lazarus Group.

Between January and July 2025, automated malware detection systems at Sonatype identified and blocked 234 distinct malware packages on prominent open source repositories npm and PyPI.

These packages, masquerading as popular developer utilities, are designed to infiltrate software supply chains and exfiltrate sensitive credentials, tokens, and intellectual property at scale.

Exploiting Weaknesses in CI/CD and Open Source Workflows

The Lazarus Group’s latest tactic leverages a deep understanding of modern software development practices particularly the widespread reliance on open source packages and automated continuous integration/continuous deployment (CI/CD) systems.

Many developers, tasked with tight deadlines and often working with thousands of software dependencies, routinely install packages directly from public registries.

The attackers capitalize on this trust by publishing counterfeit packages that closely mimic legitimate tools, making manual vetting challenging. Once incorporated into a developer’s environment or CI/CD pipeline, these packages unleash a range of payloads:

  • Credential Harvesting: Malicious code extracts environment variables, cloud API keys, and authentication tokens from the host’s memory and filesystem, sending them to remote command-and-control servers controlled by Lazarus.
  • Host Profiling and Persistence: The implants systematically collect system metadata, such as hostnames, user accounts, and network connectivity details. Some strains deploy secondary payloads to establish persistent remote backdoors, ensuring long-term access even after initial detection.
  • Propagation via Automation: Infected projects can inadvertently propagate the malware further as tainted dependencies are built and deployed to production or shared within organizations.

Sonatype’s telemetry indicates that over 36,000 developer environments may have been affected globally, a number that is likely to rise as more incidents come to light.

Shifting the Geopolitical Battlefield to Open Source

Lazarus, also known as “Hidden Cobra,” is a notorious threat group tracked to North Korea’s Reconnaissance General Bureau.

Historically responsible for major attacks, including the 2014 Sony Pictures breach and the 2017 WannaCry ransomware outbreak, Lazarus has pivoted in recent years from overt disruption to long-term, covert infiltration.

Their 2025 campaign highlights open source software as an attractive new attack surface.

This strategic focus exploits several systemic weaknesses:

  • Minimal vetting of uploaded packages to public registries.
  • Role of CI/CD systems in automatically propagating dependencies.
  • Understaffed open source projects are susceptible to impersonation and compromise.

A Wake-Up Call for Software Supply Chain Security

Sonatype’s customers benefited from proactive defense, with Repository Firewall technology automatically blocking tainted components and Lifecycle solutions alerting teams to suspect packages already within codebases.

However, the broader open source community faces an urgent call to action. Software supply chain security can no longer be an afterthought.

The Lazarus campaign demonstrates how trust in package management systems, if left unguarded, can be weaponized for espionage.

Developers, maintainers, and enterprises must prioritize holistic vetting, behavioral monitoring, and isolation of untrusted code, treating digital trust as a foundational pillar in the software creation process.

As nation-state threat actors redouble efforts to compromise open source ecosystems, defending CI/CD pipelines and reinforcing package trust has become not just a technical imperative, but a matter of global security.

Recent News

Recent News