Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks

Posted on August 18, 2025August 18, 2025 By CWS

Cybersecurity researchers have found a malicious bundle within the Python Package deal Index (PyPI) repository that introduces malicious habits by means of a dependency that enables it to determine persistence and obtain code execution.
The bundle, named termncolor, realizes its nefarious performance by means of a dependency bundle referred to as colorinal by way of a multi-stage malware operation, Zscaler ThreatLabz mentioned. Whereas termncolor was downloaded 355 instances, colorinal attracted 529 downloads. Each libraries are now not out there on PyPI.
“This assault may leverage DLL side-loading to facilitate decryption, set up persistence, and conduct command-and-control (C2) communication, ending in distant code execution,” in keeping with researchers Manisha Ramcharan Prajapati and Satyam Singh.
As soon as put in and executed, termncolor is designed to import colorinal, which, in flip, hundreds a rogue DLL that is chargeable for decrypting and working the next-stage payload.
Particularly, the payload deploys a legit binary “vcpktsvr.exe” and a DLL referred to as “libcef.dll” that is launched utilizing DLL side-loading. The DLL, for its half, is able to harvesting system info and speaking with the C2 server utilizing Zulip, an open-source chat software, to hide the exercise.
“Persistence is achieved by making a registry entry beneath the Home windows Run key to make sure automated execution of the malware at system startup,” Zscaler mentioned.
The malware can be able to infecting Linux methods, with the Python libraries dropping a shared object file referred to as “terminate.so” to unleash the identical performance.

Additional evaluation of the menace actor’s Zulip exercise has revealed three energetic customers inside the created group, with a complete of 90,692 messages exchanged inside the platform. It is believed that the malware creator has been energetic since July 10, 2025.
“The termncolor bundle and its malicious dependency colorinal spotlight the significance of monitoring open-source ecosystems for potential provide chain assaults,” the corporate mentioned.
The disclosure comes as SlowMist revealed that menace actors are concentrating on builders beneath the guise of a job evaluation to trick them into cloning a GitHub repository containing a booby-trapped npm bundle that is able to harvesting iCloud Keychain, internet browser, and cryptocurrency pockets information, and exfiltrating the small print to an exterior server.

The npm packages are additionally engineered to obtain and run Python scripts, seize system info, scan the file system for delicate recordsdata, steal credentials, log keystrokes, take screenshots, and monitor clipboard content material.
The record of recognized packages, now faraway from npm, is under –

redux-ace (163 Downloads)
rtk-logger (394 Downloads)

In latest months, malicious npm packages have been noticed concentrating on the cybersecurity group to facilitate information theft and cryptocurrency mining by means of a dependent bundle, utilizing legit providers like Dropbox to exfiltrate the data from contaminated methods.
These packages, Datadog researchers Christophe Tafani-Dereeper and Matt Muir famous, are distributed to targets beneath the guise of malicious proof-of-concept (PoC) code for safety flaws, or a kernel patch that supposedly affords efficiency enhancements. The exercise has been attributed to a menace actor it tracks as MUT-1244.

The event additionally follows a report from ReversingLabs that has revealed the dangers related to automated dependency upgrades, significantly when a compromised mission is utilized by hundreds of different initiatives, amplifying dangers to the software program provide chain.

That is exemplified by the latest compromise of the eslint-config-prettier npm bundle by way of a phishing assault that allowed unnamed attackers to push poisoned variations on to the npm registry with none supply code commits or pull requests on its corresponding GitHub repository.
The software program provide chain safety firm discovered that greater than 14,000 packages have declared eslint-config-prettier as a direct dependency, as a substitute of declaring it as a devDependency, inflicting automated actions like GitHub Actions to mechanically merge the dependency replace alerts issued by Dependabot with out scrutinizing them.

“Since it is a configuration for a improvement software used for code formatting, it may be anticipated that it needs to be declared as a devDependency throughout packages through which it’s used, and, as such, it should not be mechanically put in when the npm set up command is executed like with common dependencies,” safety researcher Karlo Zanki mentioned.
“Automated model administration instruments like Dependabot are designed to take away the danger of getting dependencies with safety points in your code base, however […] satirically they will find yourself introducing even greater safety points like malicious compromise.”

The Hacker News Tags:Attacks, Chain, Dependencies, Discovered, Exploiting, Malicious, NPM, Packages, PyPI, Supply

Post navigation

Previous Post: Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code
Next Post: Workday Data Breach Bears Signs of Widespread Salesforce Hack

Related Posts

100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads The Hacker News
CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign The Hacker News
XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks The Hacker News
Enterprise Browsers vs. Secure Browser Extensions The Hacker News
The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats The Hacker News
Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
  • Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
  • Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News