North Korean ‘Contagious Interview’ Campaign Evolves With JSON-Based Malware Delivery

North Korea’s “Contagious Interview” campaign is evolving with new stealth techniques, using legitimate JSON-based storage services to host malware delivered through trojanized developer tools. NVISO researchers warn this shift helps attackers evade detection while targeting developers for long-term espionage.
North Korean ‘Contagious Interview’ Campaign Evolves With JSON-Based Malware Delivery
Table of Contents
    Add a header to begin generating the table of contents

    North Korean cyber espionage continues to evolve, with the latest tactics in the ‘Contagious Interview’ campaign showcasing a pivot to more covert malware distribution channels. According to cybersecurity researchers at NVISO, the campaign now leverages legitimate JSON-based storage services to stage and serve malicious payloads embedded within trojanized development tools—demonstrating both creativity and persistence by the threat actors.

    JSON Platforms Used as Malware Delivery Infrastructure

    Shift to Web-Based Object Storage Services

    Researchers investigating recent incidents attributed to the ‘Contagious Interview’ campaign have observed attackers using seemingly harmless web platforms such as JSON Keeper, JSONsilo, and npoint.io to host malware payloads. These services are typically used by software developers to store and access structured data in the JavaScript Object Notation (JSON) format.

    “The approach allows the attackers to hide in plain sight. General-purpose JSON platforms don’t typically draw attention from security filters,” noted NVISO researchers Bart Parys and Stefaan Bureau.

    This adaptation allows threat actors to bypass traditional filtering mechanisms that often inspect domain reputation but not necessarily payload structure or hosting services associated with malware.

    New Variants of Trojanized Developer Tools Used as Lures

    Targeting Developers Through Familiar Tooling

    The campaign continues its focus on social engineering developers and IT professionals, packaging malware inside software repositories posing as legitimate development tools. NVISO reports that recent observed samples mimic code or utilities used within development environments, enticing users to unknowingly download compromised software.

    Attackers effectively combine:

    • Trusted open-source tools modified with embedded malicious logic
    • Social engineering techniques like fake job offers or interview requests
    • Payload retrievals mediated through benign-seeming JSON snippets

    Once the user executes the trojanized script, it contacts one of the JSON storage endpoints to retrieve the secondary malware stage.

    Advantages of a JSON-Based Delivery Mechanism

    Detection Evasion and Payload Modularity

    The switch to using JSON as a malware distribution vector brings several tactical benefits for threat actors:

    • Stealth – JSON payloads blend into legitimate development environments; they appear as harmless configuration or data files
    • Modularity – Attackers can update payloads without modifying the initial dropper code; only the content on the JSON hosting site needs replacement
    • Low barrier to access – JSON-hosting services rarely implement access restrictions or active file scanning, making them conducive to staging malicious scripts

    Such techniques are aligned with advanced persistent threat (APT) behaviors and underline the group’s evolution from traditional phishing and custom command-and-control (C2) servers.

    Attribution and Broader Strategic Goals

    Link to North Korean State-Sponsored Activities

    The ‘Contagious Interview’ campaign has long been associated with North Korean state-backed cyber actors, most notably the groups tracked as Lazarus or Hidden Cobra. These campaigns often pursue multiple objectives:

    • Stealing intellectual property
    • Gaining footholds in foreign development environments
    • Collecting intelligence or credentials for deeper lateral movement

    Unlike financially motivated ransomware groups, these operations are marked by methodical reconnaissance and a willingness to repurpose public infrastructure for covert delivery, including GitHub repositories, cloud functions, and now JSON storage platforms.

    Defensive Considerations and Mitigation Steps

    Threat Detection Must Account for Obscure Data Channels

    Given the ambiguity of JSON-based delivery vehicles, traditional security layers may fail to detect such payload retrievals. Security teams should consider:

    1. Implementing behavioral analytics to identify unusual script executions or data parsing behavior
    2. Blocking or forwarding logs from known JSON storage services if not required in enterprise contexts
    3. Encouraging development teams to verify the origin and integrity of external tools before execution

    Additionally, threat intelligence sharing plays a vital role in flagging known indicators of compromise (IoCs) as attackers make use of smaller and lesser-known hosting services to delay detection times.

    Evasion Remains a Core Strategy

    The continued development of the ‘Contagious Interview’ campaign illustrates the ingenuity of North Korean cyber actors in their pursuit of long-term espionage goals. The use of JSON-based malware delivery further complicates detection and reveals the blurred lines between legitimate developer ecosystems and malicious activity. Organizations should elevate scrutiny around developer tools and data formats previously considered benign, as threat actors find increasingly unconventional paths to infiltrate systems.

    Related Posts