The “Graphalgo” campaign represents a modular software supply-chain intrusion targeting developers directly.
-
The “Graphalgo” campaign represents a modular software supply-chain intrusion targeting developers directly.
Per ReversingLabs findings:
• 192 malicious npm/PyPI packages
• Delayed payload activation (post-version change)
• GitHub repos clean — malicious logic introduced via dependency chain
• RAT variants in JS, Python, VBS
• MetaMask wallet targeting
• Token-protected C2 channels
• GMT+9 commit indicatorsAttribution aligns with historical tradecraft associated with Lazarus Group:
Crypto-focused targeting
Recruitment vector infection
Patience-based staged activationThis is a direct developer-layer attack bypassing enterprise perimeter defenses.
Are dependency registries the new primary attack surface?
Engage below.Follow @technadu for advanced threat analysis.
#ThreatIntel #SupplyChainSecurity #MalwareAnalysis #RAT #OpenSourceSecurity #DevSecOps #LazarusGroup #PackageSecurity #AppSec #BlueTeam #CyberThreats #IoC #Infosec

-
R relay@relay.infosec.exchange shared this topic