Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Larawang ginawa ng AI

Malicious npm packages steal developer credentials on multiple platforms

Larawang ginawa ng AI

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

On July 4, 2025, threat actors uploaded ten malicious packages to the npm registry, using typosquatting to impersonate legitimate software like TypeScript, discord.js, ethers.js, nodemon, react-router-dom, and zustand. The packages—typescriptjs, deezcord.js, dizcordjs, dezcord.js, etherdjs, ethesjs, ethetsjs, nodemonjs, react-router-dom.js, and zustand.js—tricked developers into installing them by appearing in search results for the real names.

Upon installation, a postinstall script activates, spawning a hidden terminal that executes 'app.js' and clears the window to avoid notice. This loader employs four obfuscation layers: a self-decoding eval wrapper, XOR decryption with a dynamic key, URL-encoded payload, and heavy control-flow obfuscation. It displays a fake ASCII CAPTCHA in the terminal to seem legitimate, then sends the victim's geolocation and system fingerprint to a command-and-control server.

The malware subsequently downloads a 24MB PyInstaller-packaged infostealer binary tailored to the host OS. This tool extracts credentials from system keyrings, including Windows Credential Manager, macOS Keychain, and Linux options like SecretService, libsecret, and KWallet. It also targets Chromium-based and Firefox browsers for profiles, saved passwords, and session cookies, alongside SSH keys in common directories and tokens such as OAuth, JWT, and API keys.

Stolen data is compressed into archives and staged in /var/tmp or /usr/tmp before exfiltration to the attacker's server at 195.133.79.43. Despite Socket's report to npm, the packages were still available as of late October 2025. Experts urge affected developers to remove the packages, rotate all credentials, and verify sources from reputable publishers to prevent compromise.

Mga Kaugnay na Artikulo

Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Larawang ginawa ng AI

Attackers hijack Linux Snap Store apps to steal crypto phrases

Iniulat ng AI Larawang ginawa ng AI

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

Iniulat ng AI

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Iniulat ng AI

A massive data breach has come to light, involving 149 million credentials left exposed online. The 98GB cache includes unique usernames and passwords from financial services, social media, and dating apps. The discovery highlights ongoing vulnerabilities in digital security.

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

Iniulat ng AI

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

 

 

 

Gumagamit ng cookies ang website na ito

Gumagamit kami ng cookies para sa analytics upang mapabuti ang aming site. Basahin ang aming patakaran sa privacy para sa higit pang impormasyon.
Tanggihan