North Korean IT operatives are deploying sophisticated new tactics by recruiting freelance workers as identity proxies to secure remote contracts and financial accounts, according to recent cyber intelligence findings. This evolving strategy represents a significant escalation in state-sponsored cyber operations, moving beyond fabricated documentation to exploit legitimate freelancers who provide remote access to their verified identities and computer systems. The scheme targets major platforms including Upwork, Freelancer, and GitHub before shifting coordination to encrypted messaging services like Telegram and Discord.
about North Korea Recruits Freelancers as Identity ProxiesGitHub
0 in Finance and 0 in Crypto last week
Solana Founder’s Accidental Perp DEX Code Sparks Frenzy
Solana founder Anatoly Yakovenko accidentally published code for a perpetual futures exchange on GitHub, triggering massive speculation about a potential Hyperliquid competitor and igniting a $6.23 million meme coin frenzy. While Yakovenko clarified he was merely experimenting with AI tools and never intended to develop the platform, the incident revealed the intense market appetite for new perpetual futures trading venues on the Solana network.
about Solana Founder's Accidental Perp DEX Code Sparks FrenzyNorth Korean Hackers Target Crypto Devs in npm Supply Chain Attack
North Korean state-sponsored hackers have deployed over 300 malicious packages through npm in a sophisticated campaign targeting Web3 and cryptocurrency developers. The ‘Contagious Interview’ operation uses fake job recruitment lures to steal credentials and wallet keys, representing a dangerous escalation in software supply chain attacks that threatens the foundation of modern web development and cryptocurrency security.
about North Korean Hackers Target Crypto Devs in npm Supply Chain AttackAstaroth Trojan Uses GitHub to Evade Detection
Cybersecurity researchers at McAfee have uncovered a sophisticated banking Trojan that leverages GitHub repositories to maintain persistence when its command servers are taken down. The Astaroth malware specifically targets South American users, stealing both banking and cryptocurrency credentials through sophisticated keylogging techniques. This represents a new evolution in how cybercriminals are abusing legitimate development platforms for malicious purposes.
about Astaroth Trojan Uses GitHub to Evade DetectionMajor npm Hack Steals Only $1K Despite Massive Reach
A sophisticated supply chain attack targeted JavaScript packages maintained by developer Qix (Josh Junon), using social engineering to take over his GitHub account. The hackers published malicious updates that could hijack cryptocurrency transactions by rewriting recipient addresses. While 10% of cloud environments contained the malicious code and 99% use the targeted packages, the attack generated only $1,043 in stolen funds according to Arkham Intelligence. Security firm Wiz attributes the limited success to rapid detection within two hours, narrow targeting conditions, and improved developer security awareness. The incident has also expanded to compromise the DuckDB SQL database system, highlighting the growing trend of software supply chain attacks that target popular dependencies to maximize reach across thousands of environments simultaneously.
about Major npm Hack Steals Only $1K Despite Massive ReachEthereum Smart Contracts Conceal Malware in npm Packages
Security researchers at ReversingLabs have uncovered a novel attack method where hackers use Ethereum smart contracts to conceal malware payloads within npm packages. Instead of hardcoding malicious infrastructure, packages like colortoolsv2 and mimelib2 read from Ethereum contracts to fetch URLs for second-stage downloaders, making detection more difficult. The attack leverages fake GitHub repositories with inflated metrics to appear legitimate, targeting developers through automated dependency updates. While download numbers were low, the technique demonstrates how blockchain’s immutability and public accessibility can be weaponized for persistent command-and-control channels. This approach echoes similar campaigns from late 2024, showing a consistent evolution in software supply chain attacks that blend social engineering with blockchain technology for resilience against takedowns.
about Ethereum Smart Contracts Conceal Malware in npm PackagesNew Bitcoin Staking Protocol Tops DeFi Development Activity
Babylon (BABY), a Bitcoin staking protocol launched in April, has become one of the most active DeFi projects on GitHub, recording 155.73 notable development events in the past 30 days, according to Santiment. The protocol seeks to resolve long-standing issues in BTC layer-2 solutions, such as latency and security. Meanwhile, DeepBook Protocol (DEEP) and Chainlink (LINK) lead the rankings with 236 and 274.67 events, respectively. Santiment emphasizes that high development activity often signals legitimate projects with upcoming features, reducing the likelihood of exit scams.
about New Bitcoin Staking Protocol Tops DeFi Development ActivityDogecoin Upgrade Proposal Aims to Add ZK-Proofs & zk-Rollups
Developers have proposed a major upgrade for Dogecoin, introducing zero-knowledge proofs and zk-rollups to enhance scalability, privacy, and functionality. The proposal, dubbed OP_CHECKZKP, would transform Dogecoin from a simple payment chain into a robust base layer for decentralized applications, gaming, and DeFi protocols. Spearheaded by DogeOS, the team behind MyDoge wallet, the upgrade has garnered support from the Dogecoin Foundation. If implemented, it could position Dogecoin as a competitor to smart contract platforms like Ethereum and Solana. The upgrade process involves technical reviews, community discussions, and testnet deployment before miners signal approval for the soft fork.
about Dogecoin Upgrade Proposal Aims to Add ZK-Proofs & zk-Rollups10 n8n Workflows to Boost Developer Productivity in 2025
The article explores how n8n, an open-source workflow automation platform, is revolutionizing developer productivity in 2025. It details 10 practical workflows, such as automated code style checking, dynamic API documentation updates, and serverless function deployments, which save developers 5-10 hours weekly. With features like 750+ integrations, a visual node-based system, and self-hosting options, n8n simplifies complex tasks, reduces manual effort, and improves collaboration. The guide provides step-by-step setups for each workflow, emphasizing time savings, efficiency, and security benefits for coders and teams.
about 10 n8n Workflows to Boost Developer Productivity in 2025Chainlink Dominates RWA Development with 351 GitHub Events
Chainlink has solidified its position as the leader in Real-World Asset (RWA) development, recording 351 GitHub events in the past month—nearly double Avalanche’s 183 and Stellar’s 144. This robust developer activity has fueled a 15% weekly price surge for LINK, now trading at $15.33. Analysts like Henry Lord predict a potential rally to $25-$30 if the trend holds. While Avalanche and Stellar lag in GitHub activity, both remain key players, with Stellar recently jumping 30% in market cap. The sustained technical progress across these projects signals growth in the broader RWA sector, though future price movements remain uncertain.
about Chainlink Dominates RWA Development with 351 GitHub Events