Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NPM Package With 56,000 Downloads Steals WhatsApp Credentials, Data

NPM Package With 56,000 Downloads Steals WhatsApp Credentials, Data

Posted on December 23, 2025December 23, 2025 By CWS

A malicious NPM package deal that capabilities as a WhatsApp Internet API library has been caught stealing customers’ credentials and information, Koi Safety warns.

The package deal, ‘Lotusbail’, a fork of the ‘Baileys’ library, has been accessible within the NPM repository for six months and has gathered over 56,000 downloads up to now.

In response to Koi, Lotusbail helps sending and receiving WhatsApp messages. It wraps the professional WebSocket shopper and each message goes via the wrapper first.

Which means that the wrapper captures customers’ credentials, in addition to all incoming and outgoing messages, and delivers all the data to the malware operator.

“All of your WhatsApp authentication tokens, each message despatched or acquired, full contact lists, media information – all the pieces that passes via the API will get duplicated and ready for exfiltration,” Koi says.

The package deal encrypts all of the collected data utilizing a customized RSA implementation earlier than transmission, to evade detection.

Moreover, the malware was noticed hijacking WhatsApp’s machine pairing course of so as to add the attacker’s personal machine and achieve backdoor entry to a sufferer’s account.

“If you use this library to authenticate, you’re not simply linking your software – you’re additionally linking the risk actor’s machine. They’ve full, persistent entry to your WhatsApp account, and you haven’t any concept they’re there,” Koi notes.Commercial. Scroll to proceed studying.

Uninstalling the malicious package deal, Koi explains, isn’t sufficient to take away the attackers’ entry. Victims have to manually unlink all gadgets from WhatsApp’s settings.

The Lotusbail NPM package deal, the cybersecurity agency notes, is a part of a complicated provide chain assault that additionally contains dozens of checks for debuggers, sandboxes, and different evaluation instruments, to evade conventional detection.

Associated: 640 NPM Packages Contaminated in New ‘Shai-Hulud’ Provide Chain Assault

Associated: Amazon Detects 150,000 NPM Packages in Worm-Powered Marketing campaign

Associated: Tens of Hundreds of Malicious NPM Packages Distribute Self-Replicating Worm

Associated: Vital Flaw in Widespread React Native NPM Package deal Exposes Builders to Assaults

Security Week News Tags:Credentials, Data, Downloads, NPM, Package, Steals, WhatsApp

Post navigation

Previous Post: Italy Antitrust Agency Fines Apple $116 Million Over Privacy Feature; Apple Announces Appeal
Next Post: A walkthrough of the Google Workspace Password Manager

Related Posts

Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities  Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities  Security Week News
Largest Azure DDoS Attack Powered by Aisuru Botnet Largest Azure DDoS Attack Powered by Aisuru Botnet Security Week News
Oracle Patches 200 Vulnerabilities With July 2025 CPU Oracle Patches 200 Vulnerabilities With July 2025 CPU Security Week News
Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023 Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023 Security Week News
Critical Vulnerability in n8n Poses Server Risks Critical Vulnerability in n8n Poses Server Risks Security Week News
100,000 Impacted by Cornwell Quality Tools Data Breach  100,000 Impacted by Cornwell Quality Tools Data Breach  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Claude Opus 4.6 Unveils 500+ Critical Vulnerabilities
  • FvncBot Exploits Android Accessibility: A New Threat
  • Transparent Tribe Targets India’s Tech Startups
  • Cybercriminals Exploit Legitimate Platforms for Ransomware
  • Odyssey Stealer Escalates Threats to macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Claude Opus 4.6 Unveils 500+ Critical Vulnerabilities
  • FvncBot Exploits Android Accessibility: A New Threat
  • Transparent Tribe Targets India’s Tech Startups
  • Cybercriminals Exploit Legitimate Platforms for Ransomware
  • Odyssey Stealer Escalates Threats to macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark