Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious NPM Package with 56K Downloads Steals WhatsApp Messages

Malicious NPM Package with 56K Downloads Steals WhatsApp Messages

Posted on December 23, 2025December 23, 2025 By CWS

A harmful npm package deal named “lotusbail” has been stealing WhatsApp messages and person information from 1000’s of builders worldwide.

The package deal, which has been downloaded over 56,000 occasions, disguises itself as a professional WhatsApp Net API library whereas secretly working malware within the background.

It presents itself as a fork of the trusted “@whiskeysockets/baileys” package deal, making it seem secure to builders who want WhatsApp integration instruments.

The malware is especially harmful as a result of it truly works as marketed. In contrast to most malicious packages that break or fail rapidly, lotusbail delivers actual performance for sending and receiving WhatsApp messages.

This intelligent method permits it to move code opinions and be deployed to manufacturing programs with out elevating suspicion. Builders set up it, take a look at it, see that it really works, and by no means understand the theft taking place behind the scenes.

Koidex report for lotusbail package deal (Supply – Koi)

The package deal has remained energetic on npm for six months and was nonetheless out there on the time of discovery.

Throughout this era, it has been silently accumulating authentication tokens, message histories, contact lists, media recordsdata, and sustaining persistent backdoor entry to contaminated WhatsApp accounts.

Koi analysts recognized the delicate malware marketing campaign after detecting uncommon behavioral patterns throughout runtime evaluation of the package deal.

The stolen info consists of full WhatsApp session keys, all previous and current messages, full contact directories with cellphone numbers, and any media or paperwork shared by means of the applying.

The malware captures this information by wrapping the professional WebSocket shopper that connects to WhatsApp servers, primarily making a man-in-the-middle assault that duplicates all the pieces passing by means of the connection.

Knowledge Theft and Encryption Mechanism

The malware makes use of a customized RSA encryption system to cover stolen information earlier than sending it to the attacker’s server.

Theft and Exfiltration (Supply – Koi)

This can be a main purple flag as a result of professional WhatsApp libraries by no means want further encryption since WhatsApp already supplies end-to-end encryption.

The customized crypto layer exists solely to encrypt stolen information so community monitoring instruments can’t detect the theft.

The exfiltration server tackle is hidden by means of 4 layers of safety: Unicode variable manipulation, LZString compression, Base-91 encoding, and AES encryption.

The Backdoor (Supply – Koi)

This makes it extraordinarily tough to hint the place the stolen information is being despatched. The malware additionally hijacks WhatsApp’s system pairing system by utilizing a hardcoded pairing code encrypted with AES.

This implies the attacker can hyperlink their very own system to sufferer accounts, giving them full management even after the malicious package deal is faraway from the system.

To keep away from detection, the package deal consists of 27 infinite loop traps that activate when debugging instruments are current, making evaluation extraordinarily tough for safety researchers.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:56K, Downloads, Malicious, Messages, NPM, Package, Steals, WhatsApp

Post navigation

Previous Post: Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
Next Post: Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush

Related Posts

Free Decryptor Released for AI-Assisted FunkSec Ransomware Free Decryptor Released for AI-Assisted FunkSec Ransomware Cyber Security News
Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams Cyber Security News
DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely Cyber Security News
DOGE Accused of Creating Live Copy of the Country’s Social Security Information in Unsecured Cloud Environment DOGE Accused of Creating Live Copy of the Country’s Social Security Information in Unsecured Cloud Environment Cyber Security News
Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China Cyber Security News
European Airport Disruptions Caused by Sophisticated Ransomware Attack European Airport Disruptions Caused by Sophisticated Ransomware Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits
  • AI Exploitation: Emerging Threats in Cybersecurity
  • CISA Directs Agencies to Remove Outdated Edge Devices
  • Flickr Security Breach Exposes User Data
  • Major Cybersecurity Developments: DDoS, AI Espionage, ESET Fixes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits
  • AI Exploitation: Emerging Threats in Cybersecurity
  • CISA Directs Agencies to Remove Outdated Edge Devices
  • Flickr Security Breach Exposes User Data
  • Major Cybersecurity Developments: DDoS, AI Espionage, ESET Fixes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark