Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ongoing Campaign Uses 60 NPM Packages to Steal Data

Posted on May 27, 2025May 27, 2025 By CWS

Safety agency Socket warns of an ongoing marketing campaign focusing on NPM customers with tens of malicious packages that may gather and exfiltrate system data.

Over the previous two weeks, a menace actor has printed 60 NPM packages containing a small script that prompts when the package deal is put in to gather hostnames, IP addresses, DNS server lists, and listing paths and ship the knowledge to an attacker-controlled Discord webhook.

Concentrating on Home windows, Linux, and macOS, the knowledge stealer script packs fundamental sandbox‑evasion checks, and was particularly designed to fingerprint any system that builds or installs one of many malicious packages.

“Mixed downloads now exceed 3,000, giving the menace actor a rising map of developer and enterprise networks that may information future intrusions. As of this writing, all packages stay stay on NPM. We’ve petitioned for his or her elimination,” Socket stated in an advisory.

The safety agency recognized three NPM accounts that printed 20 malicious packages every, particularly bbbb335656, cdsfdfafd1232436437, and sdsds656565. All packages include the identical fingerprinting code and ship information to the identical Discord webhook.

In line with Socket, as a result of the nefarious script collects each inside and exterior community identifiers, it permits the menace actor to hyperlink personal developer environments to public-facing infrastructure, enabling them to mount follow-up assaults.

“The script gathers sufficient data to attach a company’s inside community to its outward‑dealing with presence. By harvesting inside and exterior IP addresses, DNS servers, usernames, and undertaking paths, it allows a menace actor to chart the community and establish excessive‑worth targets for future campaigns,” Socket notes.

The marketing campaign can even allow subsequent provide chain assaults, because the collected data might reveal inside package deal registry URLs, together with construct paths, the corporate says.Commercial. Scroll to proceed studying.

It additionally warns that extra malicious packages is perhaps printed except actions is taken rapidly in opposition to the offending accounts, and recommends that builders use dependency‑scanning instruments to establish unusually small tarballs, hardcoded URLs, and submit‑set up hooks.

Associated: Widespread Scraping Instrument’s NPM Bundle Compromised in Provide Chain Assault

Associated: Malicious NPM Packages Goal Cursor AI’s macOS Customers

Associated: Malicious NPM Packages Goal Cryptocurrency, PayPal Customers

Associated: 9-12 months-Outdated NPM Crypto Bundle Hijacked for Data Theft

Security Week News Tags:Campaign, Data, NPM, Ongoing, Packages, Steal

Post navigation

Previous Post: Dutch Intelligence Exposes Russian “Laundry Bear” Cyber Group Behind Police Hack
Next Post: New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices

Related Posts

Chrome 136 Update Patches Vulnerability With ‘Exploit in the Wild’ Security Week News
Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits Security Week News
Orca Snaps Up Opus in Cloud Security Automation Push Security Week News
US Sanctions Myanmar Militia Involved in Cyber Scams  Security Week News
Ox Security Bags $60M Series B to Tackle Appsec Alert Fatigue  Security Week News
Chinese Spies Exploit Ivanti Vulnerabilities Against Critical Sectors Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack
  • Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials
  • New Frontiers In Identity-Based Access Control
  • New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency
  • DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • Iranian Man Pleads Guilty to Role in Baltimore Ransomware Attack
  • Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials
  • New Frontiers In Identity-Based Access Control
  • New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency
  • DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News