Over 3 Dozen Data-Stealing Malicious npm Packages Found Targeting Developers

Cyber Security

Products You May Like

Oct 03, 2023THNSoftware Security / Hacking

Nearly three dozen counterfeit packages have been discovered in the npm package repository that are designed to exfiltrate sensitive data from developer systems, according to findings from Fortinet FortiGuard Labs.

One set of packages – named @expue/webpack, @expue/core, @expue/vue3-renderer, @fixedwidthtable/fixedwidthtable, and @virtualsearchtable/virtualsearchtable – harbored an obfuscated JavaScript file that’s capable of gathering valuable secrets.

This includes Kubernetes configurations, SSH keys, and system metadata such as username, IP address, and hostname.

Cybersecurity

The cybersecurity firm said it also discovered another collection of four modules, i.e., binarium-crm, career-service-client-0.1.6, hh-dep-monitoring, and orbitplate, which results in the unauthorized extraction of source code and configuration files.

“The targeted files and directories may contain highly valuable intellectual property and sensitive information, such as various application and service credentials,” security researchers Jin Lee and Jenna Wang said. “It then archives these files and directories and uploads the resulting archives to an FTP server.”

Some of the packages observed have also been found leveraging a Discord webhook to exfiltrate sensitive data, while a few others are engineered to automatically download and execute a potentially malicious executable file from a URL.

In what’s a novel twist, a rogue package named @cima/prism-utils relied on an install script to disable TLS certificate validation (NODE_TLS_REJECT_UNAUTHORIZED=0), potentially rendering connections vulnerable to adversary-in-the-middle (AitM) attacks.

Cybersecurity

The cybersecurity company said it categorized the identified modules into nine different groups based on code similarities and functions, with a majority of them employing install scripts that run pre or post-install to carry out the data harvesting.

“End users should watch for packages that employ suspicious install scripts and exercise caution,” the researchers said.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

Products You May Like

Articles You May Like

Meta’s ‘Pay or Consent’ Approach Faces E.U. Competition Rules Scrutiny
Tesla shares soar 10% on better-than-expected Q2 deliveries report
The Emerging Role of AI in Open-Source Intelligence
MSI Crosshair 16 HX Monster Hunter Edition Launched in India; MSI Claw Availability Announced
iPhone 16, Google Pixel 9 May Get Displays with Better Brightness Supplied by Samsung: Report

Leave a Reply

Your email address will not be published. Required fields are marked *