Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malicious NPM Package with 56K Downloads Steals WhatsApp Messages

Posted on December 23, 2025December 23, 2025 By CWS

A harmful npm package deal named “lotusbail” has been stealing WhatsApp messages and person information from 1000’s of builders worldwide.

The package deal, which has been downloaded over 56,000 occasions, disguises itself as a professional WhatsApp Net API library whereas secretly working malware within the background.

It presents itself as a fork of the trusted “@whiskeysockets/baileys” package deal, making it seem secure to builders who want WhatsApp integration instruments.

The malware is especially harmful as a result of it truly works as marketed. In contrast to most malicious packages that break or fail rapidly, lotusbail delivers actual performance for sending and receiving WhatsApp messages.

This intelligent method permits it to move code opinions and be deployed to manufacturing programs with out elevating suspicion. Builders set up it, take a look at it, see that it really works, and by no means understand the theft taking place behind the scenes.

Koidex report for lotusbail package deal (Supply – Koi)

The package deal has remained energetic on npm for six months and was nonetheless out there on the time of discovery.

Throughout this era, it has been silently accumulating authentication tokens, message histories, contact lists, media recordsdata, and sustaining persistent backdoor entry to contaminated WhatsApp accounts.

Koi analysts recognized the delicate malware marketing campaign after detecting uncommon behavioral patterns throughout runtime evaluation of the package deal.

The stolen info consists of full WhatsApp session keys, all previous and current messages, full contact directories with cellphone numbers, and any media or paperwork shared by means of the applying.

The malware captures this information by wrapping the professional WebSocket shopper that connects to WhatsApp servers, primarily making a man-in-the-middle assault that duplicates all the pieces passing by means of the connection.

Knowledge Theft and Encryption Mechanism

The malware makes use of a customized RSA encryption system to cover stolen information earlier than sending it to the attacker’s server.

Theft and Exfiltration (Supply – Koi)

This can be a main purple flag as a result of professional WhatsApp libraries by no means want further encryption since WhatsApp already supplies end-to-end encryption.

The customized crypto layer exists solely to encrypt stolen information so community monitoring instruments can’t detect the theft.

The exfiltration server tackle is hidden by means of 4 layers of safety: Unicode variable manipulation, LZString compression, Base-91 encoding, and AES encryption.

The Backdoor (Supply – Koi)

This makes it extraordinarily tough to hint the place the stolen information is being despatched. The malware additionally hijacks WhatsApp’s system pairing system by utilizing a hardcoded pairing code encrypted with AES.

This implies the attacker can hyperlink their very own system to sufferer accounts, giving them full management even after the malicious package deal is faraway from the system.

To keep away from detection, the package deal consists of 27 infinite loop traps that activate when debugging instruments are current, making evaluation extraordinarily tough for safety researchers.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:56K, Downloads, Malicious, Messages, NPM, Package, Steals, WhatsApp

Post navigation

Previous Post: Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
Next Post: Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush

Related Posts

Microsoft Entra Credentials in the Authenticator App on Jail-Broken Devices to be Wiped Out Cyber Security News
APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators Cyber Security News
Windows 11 24H2 Update Hides the Password Icon in the Sign-in Options on the Lock Screen Cyber Security News
What Businesses Need to Know Cyber Security News
Ransomware Negotiation When and How to Engage Attackers Cyber Security News
Bloody Wolf Hackers Mimic as Government Agencies to Deploy NetSupport RAT via Weaponized PDF’s Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Adds Digiever Authorization Vulnerability to KEV List Following Active Exploitation
  • Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances
  • 3.5 Million Affected by University of Phoenix Data Breach
  • FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks
  • Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Adds Digiever Authorization Vulnerability to KEV List Following Active Exploitation
  • Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances
  • 3.5 Million Affected by University of Phoenix Data Breach
  • FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks
  • Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark