Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

Posted on December 22, 2025December 22, 2025 By CWS

Cybersecurity researchers have disclosed particulars of a brand new malicious package deal on the npm repository that works as a totally purposeful WhatsApp API, but additionally comprises the flexibility to intercept each message and hyperlink the attacker’s gadget to a sufferer’s WhatsApp account.
The package deal, named “lotusbail,” has been downloaded over 56,000 instances because it was first uploaded to the registry by a person named “seiren_primrose” in Might 2025. Of those, 711 downloads occurred over the past week. The library remains to be accessible for obtain as of writing.
Beneath the quilt of a purposeful device, the malware “steals your WhatsApp credentials, intercepts each message, harvests your contacts, installs a persistent backdoor, and encrypts every little thing earlier than sending it to the risk actor’s server,” Koi Safety researcher Tuval Admoni stated in a report revealed over the weekend.
Particularly, it is geared up to seize authentication tokens and session keys, message historical past, contact lists with cellphone numbers, in addition to media recordsdata and paperwork. Extra considerably, the library is impressed by @whiskeysockets/baileys, a professional WebSockets-based TypeScript library for interacting with the WhatsApp Internet API.

That is completed by the use of a malicious WebSocket wrapper via which authentication data and messages are routed, thereby permitting it to seize credentials and chats. The stolen information is transmitted to an attacker-controlled URL in encrypted type.
The assault does not cease there, for the package deal additionally harbors covert performance to create persistent entry to the sufferer’s WhatsApp account by hijacking the gadget linking course of through the use of a hard-coded pairing code.

“While you use this library to authenticate, you are not simply linking your utility — you are additionally linking the risk actor’s gadget,” Admoni stated. “They’ve full, persistent entry to your WhatsApp account, and you don’t have any thought they’re there.”
By linking their gadget to the goal’s WhatsApp, it not solely permits continued entry to their contacts and conversations but additionally allows persistent entry even after the package deal is uninstalled from the system, given the risk actor’s gadget stays linked to the WhatsApp account till it is unlinked by navigating to the app’s settings.
Koi Safety’s Idan Dardikman informed The Hacker Information that the malicious exercise is triggered when the developer makes use of the library to connect with WhatsApp.

“The malware wraps the WebSocket shopper, so when you authenticate and begin sending/receiving messages, the interception kicks in,” Dardikman stated. “No particular perform wanted past regular utilization of the API. The backdoor pairing code additionally prompts through the authentication move – so the attacker’s gadget will get linked the second you join your app to WhatsApp.”
Moreover, “lotusbail” comes fitted with anti-debugging capabilities that trigger it to enter into an infinite loop entice when debugging instruments are detected, inflicting it to freeze execution.
“Provide chain assaults aren’t slowing down – they’re getting higher,” Koi stated. “Conventional safety does not catch this. Static evaluation sees working WhatsApp code and approves it. Repute techniques have seen 56,000 downloads, and belief it. The malware hides within the hole between ‘this code works’ and ‘this code solely does what it claims.'”
Malicious NuGet Packages Goal the Crypto Ecosystem
The disclosure comes as ReversingLabs shared particulars of 14 malicious NuGet packages that impersonate Nethereum, a .NET integration library for the Ethereum decentralized blockchain, and different cryptocurrency-related instruments to redirect transaction funds to attacker-controlled wallets when the switch quantity exceeded $100 or exfiltrate personal keys and seed phrases.

The names of the packages, revealed from eight completely different accounts, are listed under –

binance.csharp
bitcoincore
bybitapi.web
coinbase.web.api
googleads.api
nbitcoin.unified
nethereumnet
nethereumunified
netherеum.all
solananet
solnetall
solnetall.web
solnetplus
solnetunified

The packages have leveraged a number of methods to lull customers right into a false sense of belief in safety, together with inflating obtain counts and publishing dozens of latest variations in a brief period of time to provide the impression that it is being actively maintained. The marketing campaign dates all the way in which again to July 2025.

The malicious performance is injected such that it is solely triggered when the packages are put in by builders and particular features are embedded into different purposes. Notable among the many packages is GoogleAds.API, which focuses on stealing Google Adverts OAuth data as a substitute of exfiltrating pockets information secrets and techniques.
“These values are extremely delicate, as a result of they permit full programmatic entry to a Google Adverts account and, if leaked, attackers can impersonate the sufferer’s promoting shopper, learn all marketing campaign and efficiency information, create or modify advertisements, and even spend limitless funds on a malicious or fraudulent marketing campaign,” ReversingLabs stated.

The Hacker News Tags:API, Contacts, Fake, Login, Messages, NPM, Package, Steals, Tokens, WhatsApp

Post navigation

Previous Post: BlindEagle Hackers Attacking Government Agencies with Powershell Scripts

Related Posts

Why Organizations Are Turning to RPAM The Hacker News
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet The Hacker News
Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale The Hacker News
Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution The Hacker News
3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation The Hacker News
LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
  • BlindEagle Hackers Attacking Government Agencies with Powershell Scripts
  • PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation
  • Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges
  • Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
  • BlindEagle Hackers Attacking Government Agencies with Powershell Scripts
  • PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation
  • Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges
  • Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark