Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    New EU Chat Control Proposal Moves Forward – Privacy Experts See a Dangerous Backdoor

    Technology innovation drives accountancy job changes

    UK investment bank IT outages cost £600k an hour

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      State and local opposition to new data centers is gaining steam, study shows

      November 15, 2025

      Amazon to lay off 14,000 corporate employees

      October 29, 2025

      Elon Musk launches Grokipedia as an alternative to ‘woke’ Wikipedia

      October 29, 2025

      Fears of an AI bubble are growing, but some on Wall Street aren’t worried just yet

      October 18, 2025

      The sleeper issue that could play a huge role in Virginia and New Jersey — and the midterms

      October 16, 2025
    • Business

      Government faces questions about why US AWS outage disrupted UK tax office and banking firms

      October 23, 2025

      Amazon’s AWS outage knocked services like Alexa, Snapchat, Fortnite, Venmo and more offline

      October 21, 2025

      SAP ECC customers bet on composable ERP to avoid upgrading

      October 18, 2025

      Revenue generated by neoclouds expected to exceed $23bn in 2025, predicts Synergy

      October 15, 2025

      You can now try Fortnite directly in Discord

      October 8, 2025
    • Crypto

      Think BlackRock Is Bullish on Bitcoin? Arthur Hayes Says They’re Not, Here’s Why

      November 17, 2025

      3 Altcoins To Watch In The Third Week Of November 2025

      November 17, 2025

      MicroStrategy and BitMine Strike Together — Tom Lee Says the Mania Awaits

      November 17, 2025

      Cboe Unveils First US Perpetual-Style Bitcoin and Ether Continuous Futures

      November 17, 2025

      FIRO’cious Price Rally Shows No Signs of Slowing — Can It Extend Beyond $10?

      November 17, 2025
    • Technology

      New EU Chat Control Proposal Moves Forward – Privacy Experts See a Dangerous Backdoor

      November 17, 2025

      Technology innovation drives accountancy job changes

      November 17, 2025

      UK investment bank IT outages cost £600k an hour

      November 17, 2025

      Data retention in the UK: How long should you keep data?

      November 17, 2025

      Salesforce: CIOs closer to the bridge than ever due to agentic AI

      November 17, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Malicious NPM packages fetch infostealer for Windows, Linux, macOS
    Technology

    Malicious NPM packages fetch infostealer for Windows, Linux, macOS

    TechAiVerseBy TechAiVerseOctober 30, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Malicious NPM packages fetch infostealer for Windows, Linux, macOS
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Malicious NPM packages fetch infostealer for Windows, Linux, macOS

    Ten malicious packages mimicking legitimate software projects in the npm registry download an information-stealing component that collects sensitive data from Windows, Linux, and macOS systems.

    The packages were uploaded to npm on July 4, and remained undetected for a long period due to multiple layers of obfuscation that helped escape standard static analysis mechanisms.

    According to researchers at cybersecurity company Socket, the ten packages counted nearly 10,000 downloads and stole credentials from system keyrings, browsers, and authentication services.

    At the time of writing, the packages are still available, despite Socket reporting them to npm:

    1. typescriptjs
    2. deezcord.js
    3. dizcordjs
    4. dezcord.js
    5. etherdjs
    6. ethesjs
    7. ethetsjs
    8. nodemonjs
    9. react-router-dom.js
    10. zustand.js

    Socket researchers say that the packages use a fake CAPTCHA challenge to appear legitimate and download a 24MB infostealer packaged with PyInstaller.

    To lure users, the threat actor used typosquatting, a tactic that leverages misspellings or variations of the legitimate names for TypeScript (typed superset of JavaScript), discord.js (Discord bot library), ethers.js (Ethereum JS library), nodemon (auto-restarts Node apps), react-router-dom (React browser router), and zustand (minimal React state manager).

    When searching for the legitimate packages on the npm platform, developers may mistype the name of the legitimate package or pick a malicious one listed in the results.

    Upon installation, a ‘postinstall’ script is triggered automatically to spawn a new terminal that matches the host’s detected OS. The script executes ‘app.js’ outside the visible install log and clears the window immediately to evade detection.

    The ‘app.js’ file is the malware loader which employs four obfuscation layers: self-decoding eval wrapper, XOR decryption with dynamically generated key, URL-encoded payload, and heavy control-flow obfuscation.

    The script displays a fake CAPTCHA in the terminal using ASCII to give false legitimacy to the installation process.

    Bogus ASCII CAPTCHA step
    Source: Socket

    Next, it sends the victim’s geolocation and system fingerprint information to the attacker’s command and control (C2) server. Having acquired this information, the malware downloads and automatically launches a platform-specific binary from an external source, which is a 24 MB PyInstaller-packaged executable.

    The information stealer targets system keyrings such as Windows Credential Manager, macOS Keychain, Linux SecretService, libsecret, and KWallet, as well as data stored in Chromium-based and Firefox browsers, including profiles, saved passwords, and session cookies.

    Moreover, it seeks SSH keys in common directories, and also attempts to locate and steal OAuth, JWT, and other API tokens.

    The stolen information is packaged into compressed archives and exfiltrated to the attacker’s server at 195[.]133[.]79[.]43, following a temporary staging step in /var/tmp or /usr/tmp.

    Developers who downloaded any of the listed packages are recommended to clean up the infection and rotate all access tokens and passwords, as there is a good chance that they are compromised.

    When sourcing packages from npm or other open-source indexes, it is advisable to double-check for typos and ensure that everything comes from reputable publishers and official repositories.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleWordPress security plugin exposes private data to site subscribers
    Next Article And the winner of Startup Battlefield at Disrupt 2025 is: Glīd
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    New EU Chat Control Proposal Moves Forward – Privacy Experts See a Dangerous Backdoor

    November 17, 2025

    Technology innovation drives accountancy job changes

    November 17, 2025

    UK investment bank IT outages cost £600k an hour

    November 17, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025394 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025102 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202575 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202555 Views
    Don't Miss
    Technology November 17, 2025

    New EU Chat Control Proposal Moves Forward – Privacy Experts See a Dangerous Backdoor

    New EU Chat Control Proposal Moves Forward – Privacy Experts See a Dangerous Backdoor Key…

    Technology innovation drives accountancy job changes

    UK investment bank IT outages cost £600k an hour

    Data retention in the UK: How long should you keep data?

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    New EU Chat Control Proposal Moves Forward – Privacy Experts See a Dangerous Backdoor

    November 17, 20251 Views

    Technology innovation drives accountancy job changes

    November 17, 20250 Views

    UK investment bank IT outages cost £600k an hour

    November 17, 20251 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.