Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Discover practical AI tactics for GRC — join our free expert webinar

Ghost identities, poisoned accounts, and AI agent chaos

Cameco and Brookfield sign $80 billion deal with U.S. to upgrade Westinghouse reactor

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » 10 npm packages discovered stealing developer credentials on Windows, macOS, and Linux
Identity

10 npm packages discovered stealing developer credentials on Windows, macOS, and Linux

userBy userOctober 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 29, 2025Ravi LakshmananMalware/Threat Intelligence

Cybersecurity researchers have discovered a set of 10 malicious npm packages designed to provide information theft targeting Windows, Linux, and macOS systems.

“The malware uses four layers of obfuscation to hide its payload, displays a fake CAPTCHA to appear legitimate, fingerprints the victim by IP address, and downloads a 24MB PyInstaller package information stealer that collects credentials from system keyrings, browsers, and authentication services on Windows, Linux, and macOS,” said Kush Pandya, a socket security researcher.

The npm package was uploaded to the registry on July 4, 2025 and has accumulated over 9,900 downloads in total –

deezcord.js dezcord.js dizcordjs etherdjs ethesjs ethetsjs nodemonjs react router-dom.js typescriptjs zustand.js

DFIR retainer service

The multi-step credential theft operation manifested itself in the form of various typeposquatting packages impersonating popular npm libraries such as TypeScript, discord.js, ethers.js, nodemon, react-router-dom, and zustand.

Once the malware is installed, it displays a fake CAPTCHA prompt and displays authentic-looking output that mimics the installation of legitimate packages, giving the impression that the setup process is proceeding as expected. However, the package captures the victim’s IP address in the background and sends it to an external server (‘195.133.79’).[.]43″) and proceed to the main malware drop.

For each package, upon installation, a post-installation hook automatically triggers malicious functionality that launches a script named “install.js” that detects the victim’s operating system and launches an obfuscated payload (“app.js”) in a new command prompt (Windows), GNOME Terminal or x-terminal-emulator (Linux), or Terminal (macOS) window.

“By spawning a new terminal window, the malware runs independently of the npm installation process,” Pandya points out. “During the installation, when the developer looks at the device, they can see a new window briefly appear, but the malware quickly erases the window to avoid any suspicion.”

The JavaScript contained in “app.js” is hidden by four layers of obfuscation designed to withstand analysis, including XOR encryption with dynamically generated keys, URL encoding of the payload string, and use of hexadecimal and octal arithmetic to obscure program flow.

The ultimate goal of the attack is to fetch and run a comprehensive information stealer (“data_extracter”) from the same server that has the ability to thoroughly scan the developer’s machine for secrets, authentication tokens, credentials, and session cookies from the web browser, configuration files, and SSH keys.

CIS build kit

The stealer binary also includes a platform-specific implementation of extracting credentials from the system keyring using the keyring npm library. The collected information is compressed into a ZIP archive and leaked to a server.

“System keyrings store credentials for critical services such as email clients (Outlook, Thunderbird), cloud storage synchronization tools (Dropbox, Google Drive, OneDrive), VPN connections (Cisco AnyConnect, OpenVPN), password managers, SSH passphrases, database connection strings, and other applications that integrate with the OS credential store,” Socket said.

“By directly targeting the keyring, the malware bypasses application-level security and collects stored credentials in decrypted form. These credentials provide instant access to corporate email, file storage, internal networks, and operational databases.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleStudy finds smart heat pumps could reduce system pressure
Next Article NHS launches AI tool to speed up prostate cancer diagnosis
user
  • Website

Related Posts

Discover practical AI tactics for GRC — join our free expert webinar

October 29, 2025

Ghost identities, poisoned accounts, and AI agent chaos

October 29, 2025

Active exploit hits Dassault and XWiki — confirms critical flaw CISA is under attack

October 29, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Discover practical AI tactics for GRC — join our free expert webinar

Ghost identities, poisoned accounts, and AI agent chaos

Cameco and Brookfield sign $80 billion deal with U.S. to upgrade Westinghouse reactor

Scale Up Europe Fund boosts technology leadership across the continent

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.