Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

15+ Weaponized npm Packages Attacking Windows Systems to Deliver Vidar Malware

Posted on November 7, 2025November 7, 2025 By CWS

A classy supply-chain assault has emerged concentrating on Home windows programs by compromised npm packages, marking a essential vulnerability in open-source software program distribution.

Between October 21 and 26, 2025, menace actors printed 17 malicious npm packages containing 23 releases designed to ship Vidar infostealer malware.

The marketing campaign exploited the belief builders place in package deal registries, leveraging legitimate-appearing packages that masqueraded as Telegram bot helpers, icon libraries, and forks of fashionable tasks together with Cursor and React.

The assault leveraged two lately created npm accounts, aartje and saliii229911, which printed packages downloaded over 2,240 occasions earlier than elimination from the registry.

This distribution methodology represents a paradigm shift for Vidar, traditionally unfold by phishing emails with malicious Workplace paperwork.

The misleading packaging and seemingly respectable performance allowed the malicious code to propagate extensively earlier than detection.

Bundle custom-tg-bot-plan presents like a respectable SDK on its npm web page (Supply – DATADOG Safety Labs)

Datadog Safety Labs safety researchers recognized the marketing campaign by their GuardDog static analyzer, which flagged suspicious indicators together with postinstall script execution and course of spawning operations.

The invention revealed that each one packages executed an identical assault chains by postinstall scripts, with some variants utilizing PowerShell instructions embedded immediately in package deal.json recordsdata.

An infection Mechanism and Technical Breakdown

The assault demonstrates outstanding simplicity in execution. When builders put in compromised packages, postinstall scripts mechanically triggered, downloading an encrypted ZIP archive from bullethost.cloud infrastructure.

The downloader scripts used hardcoded credentials to extract the archive, retrieving bridle.exe, a Go-compiled Vidar variant beforehand unseen in npm distributions.

The malware then executed with system privileges, initiating the knowledge theft course of.

This Vidar variant collects delicate information together with browser credentials, cookies, cryptocurrency wallets, and system recordsdata earlier than exfiltrating stolen data by command-and-control infrastructure.

The malware discovers energetic C2 servers by querying hardcoded Telegram and Steam throwaway accounts containing recurrently up to date C2 domains.

After profitable information exfiltration, the malware deletes traces of itself, complicating post-compromise detection.

The marketing campaign represents a classy understanding of npm ecosystem vulnerabilities.

Risk actors rotated between a number of C2 domains and applied variations in postinstall script implementations, prone to evade pattern-based detection programs.

All affected packages remained dwell on npm for roughly two weeks, establishing this as some of the consequential npm-based malware campaigns concentrating on enterprise improvement environments and particular person builders worldwide.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacking, Deliver, Malware, NPM, Packages, Systems, Vidar, Weaponized, Windows

Post navigation

Previous Post: New Phising Attack Targeting Travellers from Hotel’s Compromised Booking.com Account
Next Post: ClickFix Attacks Against macOS Users Evolving

Related Posts

Cisco IMC Vulnerability Attackers to Access Internal Services with Elevated Privileges Cyber Security News
Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code Cyber Security News
New Ransomware Attack Mocking Elon Musk Supporters Using PowerShell to Deploy Payloads Cyber Security News
Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System Cyber Security News
New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices Cyber Security News
Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark