Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack

Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack

Posted on May 9, 2025May 9, 2025 By CWS

A risk actor revealed three malicious variations of the favored NPM bundle ‘rand-user-agent’ to deploy and activate a distant entry trojan (RAT) on customers’ methods.

A Node.js bundle that has been deprecated, rand-user-agent generates randomized user-agent strings based mostly on prevalence. It was initially constructed as a performance instrument for Romanian software program growth agency WebScrapingAPI, however could be built-in into any node.js venture for internet scraping.

The bundle nonetheless has over 40,000 weekly downloads, however hasn’t been up to date for over seven months, and a risk actor took benefit of this to push variations injected with malicious code.

Whereas the venture’s GitHub repository has remained unchanged, exhibiting the newest clear model, 2.0.82, the risk actor revealed the malicious updates to the NPM registry, as variations 2.0.83, 1.0.110, and a pair of.0.84, explains Aikido, which first detected the suspicious code.

The malicious bundle variations deploy a backdoor named Python3127 PATH Hijack, which might manipulate directories and information, and may execute shell instructions and extra payloads.

“One of many extra delicate options of this RAT is its use of a Home windows-specific PATH hijack, geared toward quietly executing malicious binaries below the guise of Python tooling,” Aikido notes.

Responding to a SecurityWeek inquiry, WebScrapingAPI revealed that the risk actor revealed the malicious bundle variations after acquiring an outdated automation token that was not protected by two-factor authentication.

Utilizing the token, the attacker revealed variations that didn’t exist within the GitHub repository, elevated the model numbers to make them seem official, and shunned deprecating code, “hoping the brand new releases would propagate earlier than anybody observed,” WebScrapingAPI stated.Commercial. Scroll to proceed studying.

“There isn’t any proof of a breach in our source-code repository, construct pipeline, or company community. The incident was restricted to the NPM registry,” the corporate stated.

WebScrapingAPI additionally confirmed that the malicious variations downloaded a backdoor and opened a communication channel to a distant command-and-control (C&C) server.

“The malicious code was by no means current in our GitHub repository; it was launched solely within the NPM artifacts, making this a basic supply-chain assault,” the corporate advised SecurityWeek.

Customers of rand-user-agent who put in any of the malicious variations (2.0.84, 1.0.110, and a pair of.0.83) are suggested to revert to model 2.0.82 as quickly as potential and to verify their methods for the presence of malicious code and different indicators of compromise.

“We apologize to each developer and group impacted by this incident. Defending the open-source ecosystem is a duty we take severely, and we’re dedicated to full transparency as we shut each hole that allowed this assault to happen,” WebScrapingAPI stated.

Associated: Malicious NPM Packages Goal Cryptocurrency, PayPal Customers

Associated: 9-Yr-Previous NPM Crypto Bundle Hijacked for Info Theft

Associated: Snyk Says ‘Malicious’ NPM Packages A part of Analysis Venture

Associated: A whole bunch Obtain Malicious NPM Bundle Able to Delivering Rootkit

Security Week News Tags:Attack, Chain, Compromised, NPM, Package, Popular, Scraping, Supply, Tools

Post navigation

Previous Post: 160,000 Impacted by Valsoft Data Breach
Next Post: In Other News: India-Pakistan Cyberattacks, Radware Vulnerabilities, xAI Leak

Related Posts

Hundreds of N-able N-central Instances Affected by Exploited Vulnerabilities Hundreds of N-able N-central Instances Affected by Exploited Vulnerabilities Security Week News
Circumvent Raises  Million for Cloud Security Platform Circumvent Raises $6 Million for Cloud Security Platform Security Week News
US, Allies Push for SBOMs to Bolster Cybersecurity US, Allies Push for SBOMs to Bolster Cybersecurity Security Week News
Data Breach at Conduent Exposes Volvo Group Employees Data Breach at Conduent Exposes Volvo Group Employees Security Week News
Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure Security Week News
Tenzai Raises  Million in Seed Funding to Build AI-Powered Pentesting Platform Tenzai Raises $75 Million in Seed Funding to Build AI-Powered Pentesting Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New SparkCat Malware Targets Crypto Wallets on Mobile Apps
  • Top Linux VPNs for 2026: Ensure Privacy and Security
  • Top 20 APM Tools to Enhance Application Performance
  • North Korean Phishing Campaign Exploits GitHub as C2 Tool
  • Adobe Data Breach: 13 Million Records Allegedly Leaked

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New SparkCat Malware Targets Crypto Wallets on Mobile Apps
  • Top Linux VPNs for 2026: Ensure Privacy and Security
  • Top 20 APM Tools to Enhance Application Performance
  • North Korean Phishing Campaign Exploits GitHub as C2 Tool
  • Adobe Data Breach: 13 Million Records Allegedly Leaked

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark