Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NPM Package With 56,000 Downloads Steals WhatsApp Credentials, Data

NPM Package With 56,000 Downloads Steals WhatsApp Credentials, Data

Posted on December 23, 2025December 23, 2025 By CWS

A malicious NPM package deal that capabilities as a WhatsApp Internet API library has been caught stealing customers’ credentials and information, Koi Safety warns.

The package deal, ‘Lotusbail’, a fork of the ‘Baileys’ library, has been accessible within the NPM repository for six months and has gathered over 56,000 downloads up to now.

In response to Koi, Lotusbail helps sending and receiving WhatsApp messages. It wraps the professional WebSocket shopper and each message goes via the wrapper first.

Which means that the wrapper captures customers’ credentials, in addition to all incoming and outgoing messages, and delivers all the data to the malware operator.

“All of your WhatsApp authentication tokens, each message despatched or acquired, full contact lists, media information – all the pieces that passes via the API will get duplicated and ready for exfiltration,” Koi says.

The package deal encrypts all of the collected data utilizing a customized RSA implementation earlier than transmission, to evade detection.

Moreover, the malware was noticed hijacking WhatsApp’s machine pairing course of so as to add the attacker’s personal machine and achieve backdoor entry to a sufferer’s account.

“If you use this library to authenticate, you’re not simply linking your software – you’re additionally linking the risk actor’s machine. They’ve full, persistent entry to your WhatsApp account, and you haven’t any concept they’re there,” Koi notes.Commercial. Scroll to proceed studying.

Uninstalling the malicious package deal, Koi explains, isn’t sufficient to take away the attackers’ entry. Victims have to manually unlink all gadgets from WhatsApp’s settings.

The Lotusbail NPM package deal, the cybersecurity agency notes, is a part of a complicated provide chain assault that additionally contains dozens of checks for debuggers, sandboxes, and different evaluation instruments, to evade conventional detection.

Associated: 640 NPM Packages Contaminated in New ‘Shai-Hulud’ Provide Chain Assault

Associated: Amazon Detects 150,000 NPM Packages in Worm-Powered Marketing campaign

Associated: Tens of Hundreds of Malicious NPM Packages Distribute Self-Replicating Worm

Associated: Vital Flaw in Widespread React Native NPM Package deal Exposes Builders to Assaults

Security Week News Tags:Credentials, Data, Downloads, NPM, Package, Steals, WhatsApp

Post navigation

Previous Post: Italy Antitrust Agency Fines Apple $116 Million Over Privacy Feature; Apple Announces Appeal
Next Post: A walkthrough of the Google Workspace Password Manager

Related Posts

Microsoft and Steam Take Action as Unity Vulnerability Puts Games at Risk Microsoft and Steam Take Action as Unity Vulnerability Puts Games at Risk Security Week News
Blackbird.AI Raises  Million for Narrative Intelligence Platform Blackbird.AI Raises $28 Million for Narrative Intelligence Platform Security Week News
Cisco Patches High-Severity IOS XR Vulnerabilities Cisco Patches High-Severity IOS XR Vulnerabilities Security Week News
‘PackageGate’ Flaws Open JavaScript Ecosystem to Supply Chain Attacks ‘PackageGate’ Flaws Open JavaScript Ecosystem to Supply Chain Attacks Security Week News
Samsung Announces Security Improvements for Galaxy Smartphones Samsung Announces Security Improvements for Galaxy Smartphones Security Week News
All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher All Microsoft Entra Tenants Were Exposed to Silent Compromise via Invisible Actor Tokens: Researcher Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News