Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Bild generiert von KI

Malicious npm packages steal developer credentials on multiple platforms

Bild generiert von KI

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

On July 4, 2025, threat actors uploaded ten malicious packages to the npm registry, using typosquatting to impersonate legitimate software like TypeScript, discord.js, ethers.js, nodemon, react-router-dom, and zustand. The packages—typescriptjs, deezcord.js, dizcordjs, dezcord.js, etherdjs, ethesjs, ethetsjs, nodemonjs, react-router-dom.js, and zustand.js—tricked developers into installing them by appearing in search results for the real names.

Upon installation, a postinstall script activates, spawning a hidden terminal that executes 'app.js' and clears the window to avoid notice. This loader employs four obfuscation layers: a self-decoding eval wrapper, XOR decryption with a dynamic key, URL-encoded payload, and heavy control-flow obfuscation. It displays a fake ASCII CAPTCHA in the terminal to seem legitimate, then sends the victim's geolocation and system fingerprint to a command-and-control server.

The malware subsequently downloads a 24MB PyInstaller-packaged infostealer binary tailored to the host OS. This tool extracts credentials from system keyrings, including Windows Credential Manager, macOS Keychain, and Linux options like SecretService, libsecret, and KWallet. It also targets Chromium-based and Firefox browsers for profiles, saved passwords, and session cookies, alongside SSH keys in common directories and tokens such as OAuth, JWT, and API keys.

Stolen data is compressed into archives and staged in /var/tmp or /usr/tmp before exfiltration to the attacker's server at 195.133.79.43. Despite Socket's report to npm, the packages were still available as of late October 2025. Experts urge affected developers to remove the packages, rotate all credentials, and verify sources from reputable publishers to prevent compromise.

Verwandte Artikel

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Bild generiert von KI

Researchers discover SSHStalker botnet infecting Linux servers

Von KI berichtet Bild generiert von KI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Nineteen malicious packages on the npm registry are spreading a worm known as SANDWORM_MODE. These packages steal crypto keys, CI secrets, API tokens, and AI API keys. The theft occurs through MCP injection.

Von KI berichtet

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

Von KI berichtet

A deceptive package on the PyPI repository has been found impersonating the popular SymPy library. This malicious software targets Linux systems, downloading and executing the XMRig cryptocurrency miner through in-memory techniques. Security researchers have highlighted the risks posed by such supply chain attacks in open-source ecosystems.

North Korean hackers have begun exploiting a critical vulnerability known as React2Shell in malware attacks. This follows similar actions by Chinese hackers, indicating a growing interest in this security flaw. The issue poses significant risks to affected systems.

Von KI berichtet

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

 

 

 

Diese Website verwendet Cookies

Wir verwenden Cookies für Analysen, um unsere Website zu verbessern. Lesen Sie unsere Datenschutzrichtlinie für weitere Informationen.
Ablehnen