Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

Cybersecurity researchers have identified a malicious npm package named β€œos-info-checker-es6” that uses covert steganography and Google Calendar links to deliver malicious payloads. This campaign shows signs of evolution and sophistication, employing legitimate services to evade detection.
Affected: npm registry, compromised systems, supply chain ecosystem

Keypoints

  • Researchers discovered a malicious npm package called β€œos-info-checker-es6” that disguises itself as an OS utility.
  • The campaign employs Unicode steganography and uses Google Calendar links as a covert delivery method.
  • The malware’s payload is triggered through obfuscated code in later versions, connecting to a remote server.
  • Legitimate platforms like Google Calendar are exploited as part of the attack chain to evade detection.
  • Defenders are advised to analyze package behaviors, validate dependencies, and monitor outbound traffic to prevent infection.

Read More: https://thehackernews.com/2025/05/malicious-npm-package-leverages-unicode.html