Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ongoing Campaign Uses 60 NPM Packages to Steal Data

Posted on May 27, 2025May 27, 2025 By CWS

Safety agency Socket warns of an ongoing marketing campaign focusing on NPM customers with tens of malicious packages that may gather and exfiltrate system data.

Over the previous two weeks, a menace actor has printed 60 NPM packages containing a small script that prompts when the package deal is put in to gather hostnames, IP addresses, DNS server lists, and listing paths and ship the knowledge to an attacker-controlled Discord webhook.

Concentrating on Home windows, Linux, and macOS, the knowledge stealer script packs fundamental sandbox‑evasion checks, and was particularly designed to fingerprint any system that builds or installs one of many malicious packages.

“Mixed downloads now exceed 3,000, giving the menace actor a rising map of developer and enterprise networks that may information future intrusions. As of this writing, all packages stay stay on NPM. We’ve petitioned for his or her elimination,” Socket stated in an advisory.

The safety agency recognized three NPM accounts that printed 20 malicious packages every, particularly bbbb335656, cdsfdfafd1232436437, and sdsds656565. All packages include the identical fingerprinting code and ship information to the identical Discord webhook.

In line with Socket, as a result of the nefarious script collects each inside and exterior community identifiers, it permits the menace actor to hyperlink personal developer environments to public-facing infrastructure, enabling them to mount follow-up assaults.

“The script gathers sufficient data to attach a company’s inside community to its outward‑dealing with presence. By harvesting inside and exterior IP addresses, DNS servers, usernames, and undertaking paths, it allows a menace actor to chart the community and establish excessive‑worth targets for future campaigns,” Socket notes.

The marketing campaign can even allow subsequent provide chain assaults, because the collected data might reveal inside package deal registry URLs, together with construct paths, the corporate says.Commercial. Scroll to proceed studying.

It additionally warns that extra malicious packages is perhaps printed except actions is taken rapidly in opposition to the offending accounts, and recommends that builders use dependency‑scanning instruments to establish unusually small tarballs, hardcoded URLs, and submit‑set up hooks.

Associated: Widespread Scraping Instrument’s NPM Bundle Compromised in Provide Chain Assault

Associated: Malicious NPM Packages Goal Cursor AI’s macOS Customers

Associated: Malicious NPM Packages Goal Cryptocurrency, PayPal Customers

Associated: 9-12 months-Outdated NPM Crypto Bundle Hijacked for Data Theft

Security Week News Tags:Campaign, Data, NPM, Ongoing, Packages, Steal

Post navigation

Previous Post: Dutch Intelligence Exposes Russian “Laundry Bear” Cyber Group Behind Police Hack
Next Post: New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices

Related Posts

Spanish Authorities Dismantle ‘GXC Team’ Crime-as-a-Service Operation Security Week News
Code Execution Vulnerability Patched in GitHub Enterprise Server Security Week News
Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection Security Week News
Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday Security Week News
Recently Disrupted DanaBot Leaked Valuable Data for 3 Years Security Week News
Why Sincerity Is a Strategic Asset in Cybersecurity Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • High-Severity Vulnerabilities Patched by Fortinet and Ivanti
  • Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control
  • Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely
  • Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access
  • Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • High-Severity Vulnerabilities Patched by Fortinet and Ivanti
  • Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control
  • Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely
  • Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access
  • Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News