Executive Summary
Between August 2024 and September 2025, North Korean state-backed group PurpleBravo orchestrated a software supply-chain campaign targeting IT services and software development firms worldwide. Posing as recruiters or fictitious brands, the attackers lured victims—often developers and job seekers—into executing malicious code on corporate endpoints. Through malware like BeaverTail, PyLangGhost, and GolangGhost, PurpleBravo exfiltrated browser credentials and cryptocurrency wallet data while leveraging GitHub, fake websites, and VPN-based command-and-control infrastructure. Over 3,100 IP addresses and 20 organizations in South Asia, Europe, the Middle East, and Central America were exposed as probable victims, amplifying downstream risk to clients of affected IT service providers.
This incident underscores a growing trend of sophisticated, targeted software supply-chain attacks exploiting developer trust and recruitment platforms. The campaign’s overlap with other North Korean IT worker operations and its focus on outsourcing regions highlight urgent risks to organizations relying on distributed and third-party development partners.
Why This Matters Now
PurpleBravo's campaign exposes a critical and under-recognized risk to organizations that outsource software development or hire through global recruiting platforms. With attacker innovations in social engineering and leveraging trusted ecosystems, there is heightened urgency for strong supply-chain security, improved user awareness, and robust east-west network segmentation to prevent lateral movement.
Attack Path Analysis
PurpleBravo initiated their attack by distributing malicious code through fake recruiter schemes, luring job seekers to execute infostealers and RATs on corporate devices. After establishing a foothold, the attackers likely escalated privileges within developer endpoints, enabling deeper access to corporate environments. They then sought to move laterally, potentially across cloud workloads or development systems, targeting code repositories and sensitive assets. Once established, remote access tools communicated with external C2 servers via VPNs to evade detection. Credential, wallet, and proprietary data were exfiltrated through covert or encrypted channels. Downstream, affected organizations and possibly customers faced supply-chain impact due to compromised developer infrastructure.
Kill Chain Progression
Initial Compromise
Description
Victims were convinced via fraudulent recruitment channels to execute malware-laden tests and downloads, infecting endpoints within corporate networks or developer environments.
Related CVEs
CVE-2023-20273
CVSS 7.8A privilege escalation vulnerability in Cisco IOS XE software allows an authenticated, local attacker to gain root privileges.
Affected Products:
Cisco IOS XE – 16.9.1, 16.9.2, 16.9.3
Exploit Status:
exploited in the wildCVE-2023-20198
CVSS 9.8A vulnerability in the web UI of Cisco IOS XE software allows an unauthenticated, remote attacker to create an account with privilege level 15 access.
Affected Products:
Cisco IOS XE – 16.9.1, 16.9.2, 16.9.3
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Techniques reflect observed and inferred behaviors in PurpleBravo's supply chain campaign; further mapping with full STIX enrichment is possible.
Spearphishing via Service
User Execution: Malicious File
Application Layer Protocol: Web Protocols
Ingress Tool Transfer
Credentials from Password Stores
Data from Local System
Exfiltration Over C2 Channel
Supply Chain Compromise: Compromise Software Dependencies and Development Tools
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Incident Response Plan Testing and Execution
Control ID: 12.10.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy Requirements
Control ID: 500.03
DORA (Digital Operational Resilience Act) – ICT Third-Party Risk Management
Control ID: Article 28
CISA ZTMM 2.0 – User/Entity Authentication
Control ID: Identity Pillar: Identity Verification
NIS2 Directive – Supply Chain Security
Control ID: Article 21(2)(d)
ISO/IEC 27001:2022 – Information Security Policy for Supplier Relationships
Control ID: A.15.1.1
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Primary target sector facing supply-chain compromise through malicious recruitment campaigns targeting developers with credential theft and corporate device infiltration risks.
Information Technology/IT
Critical exposure via fake job interviews and coding tests leading to downstream customer compromise through staff augmentation and outsourced development services.
Financial Services
High-value targets for cryptocurrency wallet theft and credential harvesting through sophisticated social engineering attacks against fintech developers and blockchain engineers.
Venture Capital/VC
Significant risk from AI and cryptocurrency portfolio company compromises through supply-chain attacks targeting portfolio companies' development teams and technical infrastructure.
Sources
- PurpleBravo’s Targeting of the IT Software Supply Chainhttps://www.recordedfuture.com/research/purplebravos-targeting-it-software-supply-chainVerified
- BeaverTail, Software S1246 | MITRE ATT&CK®https://attack.mitre.org/software/S1246/Verified
- Contagious Interview, DeceptiveDevelopment, Gwisin Gang, Tenacious Pungsan, DEV#POPPER, PurpleBravo, TAG-121, Group G1052 | MITRE ATT&CK®https://attack.mitre.org/groups/G1052/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Applying Zero Trust segmentation, egress security policies, microsegmentation, and visibility controls would have significantly constrained PurpleBravo's attack by restricting unauthorized east-west movement, enforcing stringent egress policies, and surfacing anomalous remote access or exfiltration activities. Inline IPS and encryption controls help block exploit delivery and data theft, while distributed policy enforcement limits blast radius following compromise.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: Blocked known malicious file transfer and alerted on abnormal executable delivery.
Control: Zero Trust Segmentation
Mitigation: Prevented permission sprawl and lateral abuse by enforcing least privilege policy boundaries.
Control: East-West Traffic Security
Mitigation: Detected and blocked unauthorized intra-cloud movements between workloads and regions.
Control: Multicloud Visibility & Control
Mitigation: Surface anomalous connections to suspicious external infrastructure.
Control: Egress Security & Policy Enforcement
Mitigation: Blocked exfiltration attempts to unauthorized domains and IPs; detected anomalous outbound data flows.
Minimized downstream blast radius by containing compromised workload access.
Impact at a Glance
Affected Business Functions
- Software Development
- IT Services
- Cryptocurrency Transactions
Estimated downtime: 7 days
Estimated loss: $500,000
Potential exposure of sensitive credentials, intellectual property, and financial data due to malware exfiltration.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce zero trust microsegmentation to restrict developer endpoint access to only necessary cloud resources and code repositories.
- • Implement east-west workload traffic controls to prevent lateral movement from compromised endpoints or containers.
- • Apply policy-driven egress filtering and enforce encrypted outbound traffic to block unauthorized exfiltration and C2 communications.
- • Continuously monitor and alert on anomalous remote access patterns and unfamiliar automation within multi-cloud environments.
- • Deploy inline IPS and threat detection controls to proactively block known RAT and infostealer payloads at ingress points.

