February 26, 2026
Graphalgo: A New Threat Targeting Developers via Open-Source Supply Chains

This month, cybersecurity researchers uncovered an active and ongoing sophisticated campaign that weaponizes trust in open‑source development workflows and developer recruitment processes to spread malware. This campaign, named Graphalgo, targets software developers, especially those in Web3/crypto ecosystems, across GitHub, npm, and PyPI.
Chronology & Discovery
Security analysts traced Graphalgo back to at least early May 2025, when the first malicious npm package in this campaign, graphalgo, was published. Over the remainder of 2025, researchers observed the campaign expanding across both npm (JavaScript) and PyPI (Python) ecosystems, with hundreds of related packages surfacing.
Industry outlets such as The Hacker News, BleepingComputer, and ReversingLabs published detailed reports on the campaign, bringing widespread attention to this evolving threat.
Social Engineering via Fake Recruiters
Attackers masquerade as technical recruiters or representatives of a blockchain/crypto firm (e.g., a fictitious organization such as “veltrix‑capital”). These actors contact developers via professional and social platforms like LinkedIn, Facebook, and Reddit, promising job assignments or coding tasks.
Once engaged, developers are sent GitHub repositories that look like legitimate interview tasks. The repositories themselves appear clean; the compromise occurs when the developer installs dependencies.
Malicious Dependencies: The Core Vector
Rather than hiding malware in the visible code, the operation uses malicious packages hosted on public repositories.
Researchers identified 192 malicious npm and PyPI packages tied to this campaign.
Some packages, e.g., bigmathutils, gained over 10,000 downloads before malicious updates were pushed.
These dependencies perform actions typical of a Remote Access Trojan (RAT), establishing command‑and‑control connections once installed.
Once executed, the malware can:
Enumerate system processes
Execute arbitrary remote commands
Exfiltrate data
Deploy additional payloads
Researchers noted the malware checks for MetaMask browser extensions, suggesting an intent to compromise cryptocurrency wallets.
Who Is Behind It?
Industry analysts have high confidence that the Graphalgo campaign is part of a long‑running series of operations by the North Korea–linked Lazarus Group (also known as APT38).
Lazarus is a state‑sponsored advanced persistent threat (APT) actor that has repeatedly targeted financial, cryptocurrency, and software supply chain ecosystems through:
fake recruiters
malicious dependencies
credential theft
remote access backdoors
These tactics align with past Lazarus activities documented by security researchers.
Primary Target
Developers, especially those in JavaScript (npm) and Python (PyPI) ecosystems, are the main targets. The campaign is not limited by geography since it preys on individuals globally who work with open‑source package ecosystems.
Confirmed Scale
192 malicious packages tied to Graphalgo discovered.
Some packages attained 10,000+ downloads pre‑malicious update.
These figures suggest significant exposure across developer environments, especially where dependencies are installed without strict auditing.
At this stage, there are no public disclosures of specific corporate victims or quantified financial losses directly attributed to this campaign, though the presence of RAT malware and credential theft mechanisms indicates high potential impact to both individual developers and the broader software supply chain.
Why This Matters
Graphalgo illustrates a dangerous evolution in cybercrime:
Recruitment pipelines have become an attack surface.
Open‑source trust assumptions are being weaponized.
Developers’ machines now represent potential gateways into larger ecosystems, and compromise can mean lost credentials, stolen keys, or pivoting into corporate infrastructure.
6 Tips to Stay EXTRA SAFE
Here’s how developers and security teams can protect themselves against campaigns like Graphalgo:
1. Vet Recruiter Communications
Confirm recruiter identity through corporate domains or official contacts before engaging.
Be suspicious of unsolicited job offers with unusual technical workflows.
2. Sandbox All Code
Run external GitHub repositories and interview tasks in isolated environments such as disposable VMs or containers.
3. Audit Dependencies Before Install
Analyze package.json / requirements files manually.
Use automated tools to audit risks in dependencies (e.g., dependency scanners & software bill of materials).
4. Use Strict Package Version Pinning
Avoid pulling unpinned dependencies from public registries without review.
5. Rotate Credentials After Suspicious Execution
If you installed a questionable package: regenerate API tokens, SSH keys, and registry credentials. Revoke old credentials immediately.
Strengthen Endpoint Security
Use endpoint detection tools that flag suspicious processes and network connections.
Maintain strong anti‑malware policies and alerts.
Graphalgo isn’t just another malware campaign; it’s a structural shift in how attackers approach software supply chains. Protecting yourself now requires both technical defences and scepticism of untrusted workflows. Staying EXTRA SAFE means treating open‑source trust as a risk vector rather than an assumption.