Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ongoing Campaign Uses 60 NPM Packages to Steal Data

Posted on May 27, 2025May 27, 2025 By CWS

Safety agency Socket warns of an ongoing marketing campaign focusing on NPM customers with tens of malicious packages that may gather and exfiltrate system data.

Over the previous two weeks, a menace actor has printed 60 NPM packages containing a small script that prompts when the package deal is put in to gather hostnames, IP addresses, DNS server lists, and listing paths and ship the knowledge to an attacker-controlled Discord webhook.

Concentrating on Home windows, Linux, and macOS, the knowledge stealer script packs fundamental sandbox‑evasion checks, and was particularly designed to fingerprint any system that builds or installs one of many malicious packages.

“Mixed downloads now exceed 3,000, giving the menace actor a rising map of developer and enterprise networks that may information future intrusions. As of this writing, all packages stay stay on NPM. We’ve petitioned for his or her elimination,” Socket stated in an advisory.

The safety agency recognized three NPM accounts that printed 20 malicious packages every, particularly bbbb335656, cdsfdfafd1232436437, and sdsds656565. All packages include the identical fingerprinting code and ship information to the identical Discord webhook.

In line with Socket, as a result of the nefarious script collects each inside and exterior community identifiers, it permits the menace actor to hyperlink personal developer environments to public-facing infrastructure, enabling them to mount follow-up assaults.

“The script gathers sufficient data to attach a company’s inside community to its outward‑dealing with presence. By harvesting inside and exterior IP addresses, DNS servers, usernames, and undertaking paths, it allows a menace actor to chart the community and establish excessive‑worth targets for future campaigns,” Socket notes.

The marketing campaign can even allow subsequent provide chain assaults, because the collected data might reveal inside package deal registry URLs, together with construct paths, the corporate says.Commercial. Scroll to proceed studying.

It additionally warns that extra malicious packages is perhaps printed except actions is taken rapidly in opposition to the offending accounts, and recommends that builders use dependency‑scanning instruments to establish unusually small tarballs, hardcoded URLs, and submit‑set up hooks.

Associated: Widespread Scraping Instrument’s NPM Bundle Compromised in Provide Chain Assault

Associated: Malicious NPM Packages Goal Cursor AI’s macOS Customers

Associated: Malicious NPM Packages Goal Cryptocurrency, PayPal Customers

Associated: 9-12 months-Outdated NPM Crypto Bundle Hijacked for Data Theft

Security Week News Tags:Campaign, Data, NPM, Ongoing, Packages, Steal

Post navigation

Previous Post: Dutch Intelligence Exposes Russian “Laundry Bear” Cyber Group Behind Police Hack
Next Post: New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices

Related Posts

Iranian Hackers’ Preferred ICS Targets Left Open Amid Fresh US Attack Warning Security Week News
Samsung Announces Security Improvements for Galaxy Smartphones Security Week News
Hackers Access Legacy Systems in Oxford City Council Cyberattack Security Week News
Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List Security Week News
How Scammers Are Using AI to Steal College Financial Aid Security Week News
Madhu Gottumukkala Officially Appointed CISA Deputy Director Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News