<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>OpenSourceMalware Blog</title>
    <link>https://opensourcemalware.com/blog</link>
    <description>Security research and threat intelligence from OpenSourceMalware</description>
    <language>en-us</language>
    <lastBuildDate>Sat, 11 Apr 2026 01:39:48 GMT</lastBuildDate>
    <atom:link href="https://opensourcemalware.com/rss.xml" rel="self" type="application/rss+xml"/>
    <item>
      <title>Contagious Interview gets an upgrade for 2026 - A comprehensive analysis by OpenSourceMalware</title>
      <link>https://opensourcemalware.com/blog/contagious-interview-comprehensive</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/contagious-interview-comprehensive</guid>
      <description>A single NPM package that led us to the Lazarus Groups latest campaign targeting software engineers using fake recruiters on LinkedIn, Fiverr and UpWork.</description>
      <pubDate>Fri, 20 Nov 2026 00:00:00 GMT</pubDate>
      <author>Paul McCarty</author>
    </item>
    <item>
      <title>Velora (formerly ParaSwap) SDK Version 9.4.1 Compromised And Installing Malware</title>
      <link>https://opensourcemalware.com/blog/velora-hacked</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/velora-hacked</guid>
      <description>The npm package @velora-dex/sdk version 9.4.1 contains malicious code that automatically downloads and executes a shell script from a remote server  when the package is imported, giving attackers arbitrary code execution on the victim&apos;s system.</description>
      <pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>The Social Engineering Playbook Attackers Use to Target OSS Maintainers</title>
      <link>https://opensourcemalware.com/blog/social-engineering-playbook</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/social-engineering-playbook</guid>
      <description>Account takeovers are some of the most harmful malware campaigns. Many start by compromising a maintainer account through social engineering.</description>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
      <author>Jenn</author>
    </item>
    <item>
      <title>One of the most popular JavaScript packages on earth Axios has been compromised</title>
      <link>https://opensourcemalware.com/blog/axios-compromised</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/axios-compromised</guid>
      <description>The Axios NPM package has been compromised and the maintainer of the project has been locked out of their account.  This will go down in history as one of the most successful software supply chain attacks ever</description>
      <pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>TasksJacker: Latest DPRK Attack Skips the Fake Interview and Goes Straight to Compromising GitHub Users</title>
      <link>https://opensourcemalware.com/blog/tasksjacker-blog-post</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/tasksjacker-blog-post</guid>
      <description>A technical deep-dive into the next generation of DPRK attacks that borrows from Shai-hulud and Contagious Interview to compromise dozens of GitHub users</description>
      <pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>Has TeamPCP Pivoted To Using The PureHVNC RAT?</title>
      <link>https://opensourcemalware.com/blog/teampcp-purehvnc-campaign</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/teampcp-purehvnc-campaign</guid>
      <description>New threat campaign using PureHVNC has been tied to TeamPCP.  </description>
      <pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>TeamPCP Supply Chain Campaign: A March 2026 Retrospective</title>
      <link>https://opensourcemalware.com/blog/teampcp-supply-chain-campaign</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/teampcp-supply-chain-campaign</guid>
      <description>TeamPCP executed a cascading multi-phase supply chain attack in March 2026, leveraging a single unrevoked credential stolen from Trivy&apos;s CI pipeline to compromise several  ecosystems — Aqua Security, npm, LiteLLM/PyPI, Checkmarx, and Telnyx — harvesting CI/CD secrets at each stage to fund the next, while also deploying a geotargeted filesystem wiper against Iranian infrastructure.</description>
      <pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate>
      <author>Jenn</author>
    </item>
    <item>
      <title>TeamPCP Hijacks LiteLLM&apos;s PyPI Package — Credential Stealer Hits 40k-Star Project</title>
      <link>https://opensourcemalware.com/blog/teampcp-litellm-pypi-supply-chain-attack</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/teampcp-litellm-pypi-supply-chain-attack</guid>
      <description>TeamPCP compromised the LiteLLM maintainer&apos;s PyPI account and published malicious versions that steal credentials from every Python process on the host. The attack is connected to the prior Trivy GitHub Actions compromise and the aquasec-com org defacement.</description>
      <pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>TeamPCP Defaces Aqua Security&apos;s Internal GitHub Org — 44 Repos Exposed</title>
      <link>https://opensourcemalware.com/blog/teampcp-aquasec-com-github-org-compromise</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/teampcp-aquasec-com-github-org-compromise</guid>
      <description>TeamPCP compromised the aquasec-com GitHub organization, renaming all 44 repositories and exposing internal source code, CI/CD configs, and knowledge bases. Forensic analysis points to a stolen service account token from the prior Trivy GitHub Actions compromise.</description>
      <pubDate>Mon, 23 Mar 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>Four Arms, One Monster: GlassWorm Invades GitHub, NPM, Open VSX and VS Code</title>
      <link>https://opensourcemalware.com/blog/four-arms-one-monster</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/four-arms-one-monster</guid>
      <description>Multiple security researchers identify new Glassworm attacks that have compromised 430+ GitHub projects and attacked GitHub,  NPM, the VS Code marketplace and Open-VSX</description>
      <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>PolinRider: DPRK Threat Actor Implants Malware in Hundreds of GitHub Repos</title>
      <link>https://opensourcemalware.com/blog/polinrider-attack</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/polinrider-attack</guid>
      <description>A North Korean threat actor is implanting malware in hundreds of GitHub users and organizations repositories.  This malware is the latest DPRK Beavertail variant that steals crednetials, crypto and installs a RAT.</description>
      <pubDate>Sun, 08 Mar 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>Popular Development Framework Neutralinojs Compromised In DPRK Attack</title>
      <link>https://opensourcemalware.com/blog/neutralinojs-compromise</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/neutralinojs-compromise</guid>
      <description>The popular Neutralinojs framework was compromised in early March by DPRK threat actors as part of a larger attack that utilizes stolen GitHub credentials to force-push backdated malicious commits</description>
      <pubDate>Fri, 06 Mar 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>Malicious ClawHub Skills Use External Websites to Hide in Plain Sight (and bypass security scanning)</title>
      <link>https://opensourcemalware.com/blog/malicious-clawhub-skills-hide-in-plain-sight</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/malicious-clawhub-skills-hide-in-plain-sight</guid>
      <description>Threat actors have evolved their ClawHub attack strategy by moving payloads to convincing fake websites, allowing them to continue their malicious campaign</description>
      <pubDate>Mon, 09 Feb 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>XPACK ATTACK: Cryptocurrency Extortion Disguised as NPM Package Monetization</title>
      <link>https://opensourcemalware.com/blog/xpack-attack</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/xpack-attack</guid>
      <description>A new NPM malware campaign weaponizes NPM to extort crypto payments from developers during package installation</description>
      <pubDate>Mon, 09 Feb 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>ClawdBot Skills Just Ganked Your Crypto</title>
      <link>https://opensourcemalware.com/blog/clawdbot-skills-ganked-your-crypto</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/clawdbot-skills-ganked-your-crypto</guid>
      <description>Malicious ClawdBot Skills Target ByBit, Polymarket, Axiom, Reddit and LinkedIn to Install Malware</description>
      <pubDate>Sun, 01 Feb 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>New DPRK Contagious Interview Campaign: “Fake Font” Uses Malicious VSCode Fonts</title>
      <link>https://opensourcemalware.com/blog/contagious-code-fake-font</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/contagious-code-fake-font</guid>
      <description>North Korean Lazarus Group creates new version of Contagious Interview that uses VS Code tasks to lauch malware hiding in fake fonts</description>
      <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
      <author>Paul McCarty</author>
    </item>
    <item>
      <title>Small Open-Source Maintainers Targeted by VS Code Tasks Malware</title>
      <link>https://opensourcemalware.com/blog/oss-maintainters-vscode-tasks-compromised</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/oss-maintainters-vscode-tasks-compromised</guid>
      <description>At least 21 small OSS maintainers hit in 72 hours via malicious VS Code task configurations</description>
      <pubDate>Mon, 26 Jan 2026 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>Comparative Analysis of Contagious Interview Malware</title>
      <link>https://opensourcemalware.com/blog/contagious-interview-malware-comparisons</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/contagious-interview-malware-comparisons</guid>
      <description>A deep-dive analysis on the different malware used across the contagious-interview threat campaigns.  What do they steal?  How do they maintain persistence?  Do they target crypto wallets?</description>
      <pubDate>Sat, 24 Jan 2026 00:00:00 GMT</pubDate>
      <author>Paul McCarty</author>
    </item>
    <item>
      <title>Contagious Interview gets an upgrade for 2026 - A comprehensive analysis by OpenSourceMalware</title>
      <link>https://opensourcemalware.com/blog/contagious-interview-developer-best-practices</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/contagious-interview-developer-best-practices</guid>
      <description>A single NPM package that led us to the Lazarus Groups latest campaign targeting software engineers using fake recruiters on LinkedIn, Fiverr and UpWork.</description>
      <pubDate>Tue, 20 Jan 2026 00:00:00 GMT</pubDate>
      <author>Paul McCarty</author>
    </item>
    <item>
      <title>One API to Query Them All</title>
      <link>https://opensourcemalware.com/blog/one-api-to-query-them-all</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/one-api-to-query-them-all</guid>
      <description>Introducing the unified check-malicious API endpoint - a single, standardized way to query packages, repositories, URLs, and domains for malicious content.</description>
      <pubDate>Sat, 10 Jan 2026 00:00:00 GMT</pubDate>
      <author>OpenSource Malware Team</author>
    </item>
    <item>
      <title>New DPRK Malware Uses Microsoft VSCode Dictionary Files</title>
      <link>https://opensourcemalware.com/blog/contagious-interview-malicious-dictionary</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/contagious-interview-malicious-dictionary</guid>
      <description>North Korean threat actors are hiding multi-stage malware droppers in VSCode configuration files, disguised as spell-check dictionaries, to compromise developers through fake job interviews and establish persistent backdoors with remote code execution capabilities.</description>
      <pubDate>Tue, 23 Dec 2025 00:00:00 GMT</pubDate>
      <author>Paul McCarty</author>
    </item>
    <item>
      <title>Elf-Stats NPM Christmas Spam Campaign</title>
      <link>https://opensourcemalware.com/blog/elf-stats-spam-campaign</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/elf-stats-spam-campaign</guid>
      <description>Security research and threat intelligence.</description>
      <pubDate>Wed, 03 Dec 2025 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>Latest Contagious Interview malware campaign abuses Microsoft VSCode Tasks</title>
      <link>https://opensourcemalware.com/blog/contagious-interview-vscode</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/contagious-interview-vscode</guid>
      <description>Security research and threat intelligence.</description>
      <pubDate>Sat, 29 Nov 2025 00:00:00 GMT</pubDate>
      <author>6mile</author>
    </item>
    <item>
      <title>IndonesianFoods Worm: 86,000+ Malicious NPM Packages</title>
      <link>https://opensourcemalware.com/blog/indonesianfoods-npm-worm</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/indonesianfoods-npm-worm</guid>
      <description>An in-depth analysis of the IndonesianFoods worm, a coordinated attack that published over 86,500 malicious packages to the NPM registry, affecting 60 NPM users and more than doubling the known number of malicious NPM packages.</description>
      <pubDate>Thu, 13 Nov 2025 00:00:00 GMT</pubDate>
      <author>Paul McCarty</author>
    </item>
    <item>
      <title>Security Best Practices for Package Management</title>
      <link>https://opensourcemalware.com/blog/security-best-practices</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/security-best-practices</guid>
      <description>Essential security practices every developer should follow to protect their projects from malicious dependencies.</description>
      <pubDate>Thu, 25 Jan 2024 00:00:00 GMT</pubDate>
      <author>DevSec Team</author>
    </item>
    <item>
      <title>Understanding Software Supply Chain Attacks</title>
      <link>https://opensourcemalware.com/blog/supply-chain-attacks</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/supply-chain-attacks</guid>
      <description>A deep dive into how attackers compromise open source packages and what you can do to protect your projects.</description>
      <pubDate>Sat, 20 Jan 2024 00:00:00 GMT</pubDate>
      <author>Security Research Team</author>
    </item>
    <item>
      <title>Getting Started with OpenSource Malware</title>
      <link>https://opensourcemalware.com/blog/getting-started</link>
      <guid isPermaLink="true">https://opensourcemalware.com/blog/getting-started</guid>
      <description>Learn how to contribute to the OpenSource Malware community and help protect the software supply chain from malicious packages.</description>
      <pubDate>Mon, 15 Jan 2024 00:00:00 GMT</pubDate>
      <author>OpenSource Malware Team</author>
    </item>
  </channel>
</rss>