Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux

10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux

Posted on October 29, 2025October 29, 2025 By CWS

Oct 29, 2025Ravie LakshmananMalware / Menace Intelligence
Cybersecurity researchers have found a set of 10 malicious npm packages which might be designed to ship an data stealer focusing on Home windows, Linux, and macOS programs.
“The malware makes use of 4 layers of obfuscation to cover its payload, shows a pretend CAPTCHA to look respectable, fingerprints victims by IP deal with, and downloads a 24MB PyInstaller-packaged data stealer that harvests credentials from system keyrings, browsers, and authentication providers throughout Home windows, Linux, and macOS,” Socket safety researcher Kush Pandya stated.

The npm packages have been uploaded to the registry on July 4, 2025, and gathered over 9,900 downloads collectively –

deezcord.js
dezcord.js
dizcordjs
etherdjs
ethesjs
ethetsjs
nodemonjs
react-router-dom.js
typescriptjs
zustand.js

The multi-stage credential theft operation manifested within the type of numerous typosquatted packages impersonating common npm libraries equivalent to TypeScript, discord.js, ethers.js, nodemon, react-router-dom, and zustand.
As soon as put in, the malware serves a pretend CAPTCHA immediate and shows authentic-looking output that mimics respectable bundle installations to offer the impression that the setup course of is continuing alongside anticipated strains. Nonetheless, within the background, the bundle captures the sufferer’s IP deal with, sends it to an exterior server (“195.133.79[.]43”), after which proceeds to drop the principle malware.
In every bundle, the malicious performance is robotically triggered upon set up by the use of a postinstall hook, launching a script named “set up.js” that detects the sufferer’s working system and launches an obfuscated payload (“app.js”) in a brand new Command Immediate (Home windows), GNOME Terminal or x-terminal-emulator (Linux), or Terminal (macOS) window.

“By spawning a brand new terminal window, the malware runs independently of the npm set up course of,” Pandya famous. “Builders who look at their terminal throughout set up see a brand new window briefly seem, which the malware instantly clears to keep away from suspicion.”

The JavaScript contained inside “app.js” is hidden via 4 layers of obfuscation — equivalent to XOR cipher with a dynamically generated key, URL-encoding of the payload string, and utilizing hexadecimal and octal arithmetic to obscure program circulation — which might be designed to withstand evaluation.
The top purpose of the assault is to fetch and execute a complete data stealer (“data_extracter”) from the identical server that is outfitted to completely scan the developer’s machine for secrets and techniques, authentication tokens, credentials, and session cookies from net browsers, configuration recordsdata, and SSH keys.

The stealer binary additionally incorporates platform-specific implementations to extract credentials from the system keyring utilizing the keyring npm library. The harvested data is compressed right into a ZIP archive and exfiltrated to the server.
“System keyrings retailer credentials for essential providers together with e mail purchasers (Outlook, Thunderbird), cloud storage sync instruments (Dropbox, Google Drive, OneDrive), VPN connections (Cisco AnyConnect, OpenVPN), password managers, SSH passphrases, database connection strings, and different purposes that combine with the OS credential retailer,” Socket stated.
“By focusing on the keyring instantly, the malware bypasses application-level safety and harvests saved credentials of their decrypted type. These credentials present rapid entry to company e mail, file storage, inside networks, and manufacturing databases.”

The Hacker News Tags:Caught, Credentials, Developer, Linux, macOS, NPM, Packages, Stealing, Windows

Post navigation

Previous Post: CISA Warns of Exploited DELMIA Factory Software Vulnerabilities
Next Post: New Beast Ransomware Actively Scans for Active SMB Port from Breached System to Spread Across Network

Related Posts

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks The Hacker News
North Korea-Linked Hackers Steal .02 Billion in 2025, Leading Global Crypto Theft North Korea-Linked Hackers Steal $2.02 Billion in 2025, Leading Global Crypto Theft The Hacker News
Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features The Hacker News
XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities The Hacker News
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks The Hacker News
Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark