Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NPM Package With 56,000 Downloads Steals WhatsApp Credentials, Data

NPM Package With 56,000 Downloads Steals WhatsApp Credentials, Data

Posted on December 23, 2025December 23, 2025 By CWS

A malicious NPM package deal that capabilities as a WhatsApp Internet API library has been caught stealing customers’ credentials and information, Koi Safety warns.

The package deal, ‘Lotusbail’, a fork of the ‘Baileys’ library, has been accessible within the NPM repository for six months and has gathered over 56,000 downloads up to now.

In response to Koi, Lotusbail helps sending and receiving WhatsApp messages. It wraps the professional WebSocket shopper and each message goes via the wrapper first.

Which means that the wrapper captures customers’ credentials, in addition to all incoming and outgoing messages, and delivers all the data to the malware operator.

“All of your WhatsApp authentication tokens, each message despatched or acquired, full contact lists, media information – all the pieces that passes via the API will get duplicated and ready for exfiltration,” Koi says.

The package deal encrypts all of the collected data utilizing a customized RSA implementation earlier than transmission, to evade detection.

Moreover, the malware was noticed hijacking WhatsApp’s machine pairing course of so as to add the attacker’s personal machine and achieve backdoor entry to a sufferer’s account.

“If you use this library to authenticate, you’re not simply linking your software – you’re additionally linking the risk actor’s machine. They’ve full, persistent entry to your WhatsApp account, and you haven’t any concept they’re there,” Koi notes.Commercial. Scroll to proceed studying.

Uninstalling the malicious package deal, Koi explains, isn’t sufficient to take away the attackers’ entry. Victims have to manually unlink all gadgets from WhatsApp’s settings.

The Lotusbail NPM package deal, the cybersecurity agency notes, is a part of a complicated provide chain assault that additionally contains dozens of checks for debuggers, sandboxes, and different evaluation instruments, to evade conventional detection.

Associated: 640 NPM Packages Contaminated in New ‘Shai-Hulud’ Provide Chain Assault

Associated: Amazon Detects 150,000 NPM Packages in Worm-Powered Marketing campaign

Associated: Tens of Hundreds of Malicious NPM Packages Distribute Self-Replicating Worm

Associated: Vital Flaw in Widespread React Native NPM Package deal Exposes Builders to Assaults

Security Week News Tags:Credentials, Data, Downloads, NPM, Package, Steals, WhatsApp

Post navigation

Previous Post: Italy Antitrust Agency Fines Apple $116 Million Over Privacy Feature; Apple Announces Appeal
Next Post: A walkthrough of the Google Workspace Password Manager

Related Posts

Dozens of SysAid Instances Vulnerable to Remote Hacking Dozens of SysAid Instances Vulnerable to Remote Hacking Security Week News
Aanchal Gupta Joins Adobe as Chief Security Officer Aanchal Gupta Joins Adobe as Chief Security Officer Security Week News
AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk Security Week News
Critical Vulnerability Patched in Citrix NetScaler Critical Vulnerability Patched in Citrix NetScaler Security Week News
Coinbase Rejects M Ransom After Rogue Contractors Bribed to Leak Customer Data Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data Security Week News
Zyxel Firewall Vulnerability Again in Attacker Crosshairs Zyxel Firewall Vulnerability Again in Attacker Crosshairs Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark