Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious NPM Package with 56K Downloads Steals WhatsApp Messages

Malicious NPM Package with 56K Downloads Steals WhatsApp Messages

Posted on December 23, 2025December 23, 2025 By CWS

A harmful npm package deal named “lotusbail” has been stealing WhatsApp messages and person information from 1000’s of builders worldwide.

The package deal, which has been downloaded over 56,000 occasions, disguises itself as a professional WhatsApp Net API library whereas secretly working malware within the background.

It presents itself as a fork of the trusted “@whiskeysockets/baileys” package deal, making it seem secure to builders who want WhatsApp integration instruments.

The malware is especially harmful as a result of it truly works as marketed. In contrast to most malicious packages that break or fail rapidly, lotusbail delivers actual performance for sending and receiving WhatsApp messages.

This intelligent method permits it to move code opinions and be deployed to manufacturing programs with out elevating suspicion. Builders set up it, take a look at it, see that it really works, and by no means understand the theft taking place behind the scenes.

Koidex report for lotusbail package deal (Supply – Koi)

The package deal has remained energetic on npm for six months and was nonetheless out there on the time of discovery.

Throughout this era, it has been silently accumulating authentication tokens, message histories, contact lists, media recordsdata, and sustaining persistent backdoor entry to contaminated WhatsApp accounts.

Koi analysts recognized the delicate malware marketing campaign after detecting uncommon behavioral patterns throughout runtime evaluation of the package deal.

The stolen info consists of full WhatsApp session keys, all previous and current messages, full contact directories with cellphone numbers, and any media or paperwork shared by means of the applying.

The malware captures this information by wrapping the professional WebSocket shopper that connects to WhatsApp servers, primarily making a man-in-the-middle assault that duplicates all the pieces passing by means of the connection.

Knowledge Theft and Encryption Mechanism

The malware makes use of a customized RSA encryption system to cover stolen information earlier than sending it to the attacker’s server.

Theft and Exfiltration (Supply – Koi)

This can be a main purple flag as a result of professional WhatsApp libraries by no means want further encryption since WhatsApp already supplies end-to-end encryption.

The customized crypto layer exists solely to encrypt stolen information so community monitoring instruments can’t detect the theft.

The exfiltration server tackle is hidden by means of 4 layers of safety: Unicode variable manipulation, LZString compression, Base-91 encoding, and AES encryption.

The Backdoor (Supply – Koi)

This makes it extraordinarily tough to hint the place the stolen information is being despatched. The malware additionally hijacks WhatsApp’s system pairing system by utilizing a hardcoded pairing code encrypted with AES.

This implies the attacker can hyperlink their very own system to sufferer accounts, giving them full management even after the malicious package deal is faraway from the system.

To keep away from detection, the package deal consists of 27 infinite loop traps that activate when debugging instruments are current, making evaluation extraordinarily tough for safety researchers.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:56K, Downloads, Malicious, Messages, NPM, Package, Steals, WhatsApp

Post navigation

Previous Post: Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
Next Post: Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush

Related Posts

Hackers Infiltrate VS Code Marketplace with 19 Malicious Extensions Posing as PNG File Hackers Infiltrate VS Code Marketplace with 19 Malicious Extensions Posing as PNG File Cyber Security News
Beyond CVEs – Turning Visibility into Action with ASM Beyond CVEs – Turning Visibility into Action with ASM Cyber Security News
Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network Cyber Security News
New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools Cyber Security News
Livewire Filemanager Vulnerability Exposes Web Applications to RCE Attacks Livewire Filemanager Vulnerability Exposes Web Applications to RCE Attacks Cyber Security News
Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Target Linux Devices with Malware
  • China-Linked DKnife Framework Exploits Routers for Attacks
  • CISA Demands Removal of Outdated Network Devices
  • Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits
  • AI Exploitation: Emerging Threats in Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Target Linux Devices with Malware
  • China-Linked DKnife Framework Exploits Routers for Attacks
  • CISA Demands Removal of Outdated Network Devices
  • Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits
  • AI Exploitation: Emerging Threats in Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark