NPM targeted by malware campaign mimicking familiar library names

NPM targeted by malware campaign mimicking familiar library names
Developers are increasingly falling prey to malicious NPM packages that mimic popular libraries, exploiting cross-ecosystem typosquatting tactics. These packages contain obfuscated code designed to execute malicious actions, exfiltrate data, and persist on infected systems.
Affected: NPM ecosystem, developers, Python, Java, C++, .NET, Node.js

Keypoints :

  • Coordinated malware operation discovered in the NPM ecosystem.
  • Malicious packages mimic popular libraries from other programming languages.
  • Obfuscated code is used to evade security measures.
  • Exfiltration of sensitive data and maintaining persistence on systems.
  • Common IP address traced to a cloud provider in Beijing.
  • Cross-ecosystem typosquatting is the main strategy used.
  • Developer awareness and trust in package names is being exploited.

MITRE Techniques :

  • T1071.001: Application Layer Protocol – Fetching malicious code via HTTPS.
  • T1059.001: PowerShell – Executing commands through script downloads.
  • T1105: Ingress Tool Transfer – Transferring tools from remote locations.
  • T1005: Data from Local System – Collecting system data and credentials.
  • T1083: File and Directory Discovery – Scanning system directories for sensitive files.
  • T1033: System Owner/User Discovery – Targeting specific user/system environments.
  • T1070.001: File Deletion – Removing traces of the attack.
  • T1027: Obfuscation – Hiding malicious code to avoid detection.
  • T1029: Scheduled Task/Job – Maintaining persistence with scheduled tasks.
  • T1070.004: Permissions Modification – Modifying file permissions to maintain control.
  • T1041: Exfiltration Over C2 – Exfiltrating data over command and control channels.
  • T1030: Data Transfer Size Limits – Evading detection by exfiltrating small chunks.
  • T1055: Process Injection – Injecting malicious code into legitimate processes.
  • T1082: System Information Discovery – Gathering system info and credentials.

Indicator of Compromise :

  • [IP Address] 8.152.163.60


Full Story: https://socket.dev/blog/npm-targeted-by-malware-campaign-mimicking-familiar-library-names

Views: 35