Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads

Posted on May 9, 2025May 12, 2025 By CWS

A classy provide chain assault concentrating on the favored npm package deal ‘rand-user-agent’ was found on Could 5, 2025.

The compromise impacts a respectable JavaScript library used to generate randomized user-agent strings for net scraping operations, inserting malicious code that establishes distant entry capabilities on contaminated methods.

Safety researchers detected suspicious code in model 1.0.110 of the package deal, which was printed with out authorization from the unique maintainers at WebScrapingAPI.

The assault is especially regarding provided that ‘rand-user-agent’ averages roughly 45,000 weekly downloads, creating a large potential assault floor throughout improvement environments.

The package deal remained uncompromised for years till this latest incident, with the final respectable model (2.0.82) printed seven months in the past in keeping with the official GitHub repository.

Three malicious variations have since appeared on the npm registry: 2.0.83, 2.0.84, and 1.0.110.

Aikido Push researchers recognized the malware by way of their automated evaluation pipeline, noting how attackers hid their code by hiding it past the traditional horizontal scroll view within the package deal’s distribution recordsdata.

Upon evaluation, the malicious payload was recognized as a complicated Distant Entry Trojan (RAT) dubbed “RATatouille” on account of its functionality to cover amongst respectable code whereas establishing persistence.

The embedded malware constructs covert communication channels with command-and-control infrastructure at 85.239.62[.]36, utilizing each port 3306 for socket connections and port 27017 for file exfiltration.

Upon execution, the RAT experiences system data together with hostname, username, working system kind, and course of ID to its operators.

Safety evaluation reveals the malware variations try to evade detection by using a number of layers of obfuscation and establishing a hidden node_modules listing within the person’s house folder to retailer extra malicious elements.

Technical Evaluation of An infection Mechanism

The RAT employs a complicated set up method, dynamically importing dependencies like ‘socket.io-client’ and ‘axios’ in the event that they aren’t current.

It modifies module paths to make sure these dependencies load from its customized node_modules listing relatively than the challenge’s respectable one.

This strategy permits the malware to function independently of the challenge’s dependency construction.

One notably regarding functionality is the Home windows-specific PATH hijack concentrating on Python installations.

The malware prepends a non-standard Python listing to the system PATH:-

const Y = path. Be part of(
course of.env.LOCALAPPDATA || path.be part of(os.homedir(), ‘AppData’, ‘Native’),
‘PackagesPythonPython3127’
)
env.PATH = Y + ‘;’ + course of.env.PATH

This PATH manipulation permits attackers to execute malicious binaries every time a Python-related command is triggered, successfully hijacking respectable Python operations.

Suspicious code (Supply – Aikido)

The malware hides its code within the distribution file by inserting it past the seen space of code editors.

Organizations utilizing any model of rand-user-agent printed after October 2024 ought to instantly examine for indicators of compromise, notably unauthorized community connections to the recognized C2 infrastructure and surprising modifications to Python setting paths.

Are you from the SOC and DFIR Groups? – Analyse Actual time Malware Incidents with ANY.RUN -> Begin Now for Free.

Cyber Security News Tags:Attack, Chain, Downloads, Legitimate, NPM, Package, Supply, Targets, Weekly

Post navigation

Previous Post: In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak
Next Post: New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands

Related Posts

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024 Cyber Security News
Chinese Hackers Exploit SharePoint Vulnerabilities to Deploy Toolsets Includes Backdoor, Ransomware and Loaders Cyber Security News
HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit Cyber Security News
Orange Hit by Cyberattack – A French Telecom Giant’s Internal Systems Hacked Cyber Security News
Pro-Iranian Hacktivists Targeting US Networks Department of Homeland Security Warns Cyber Security News
How To Get Real-Time IOCs From Incidents Across 15K SOCs  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites
  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Serial Hacker Jailed for Hacking and Defacing Organizations’ Websites
  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News