Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Large Android scam business has been revealed: Iconads, KaleIdoscope, SMS Malware, NFC Scams Identified apps are designed to load out-of-context ads on users’ screens and hide icons from the device’s home screen launcher, making it difficult for victims to remove them according to the company’s Satori Threat Intelligence and Research team. The app was then removed from the Play Store by Google. Advertising fraud schemes accounted for 1.2 billion bid requests per day due to their high activity. The majority of Iconads-related traffic comes from Brazil, Mexico and the United States. Iconads is a variant of the threat tracked by other cybersecurity vendors under the name Hiddedads and Vapor, and since at least 2019, malicious apps have been sliding around the Google Play Store repeatedly. Some of the common features of these apps include the use of obfuscation for concealment…

Ransomware Gang Hunter International says it’s shut down

Everything you need to know about Flash, Blueski-based Instagram alternatives

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious NPM packages modify local “ether” libraries to launch reverse shell attacks
Identity

Malicious NPM packages modify local “ether” libraries to launch reverse shell attacks

userBy userMarch 26, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 26, 2025Ravi LakshmananSupply Chain Attacks/Malware

Malicious NPM Packages

Cybersecurity researchers have discovered two malicious packages in the NPM registry. It is designed to infect other locally installed packages, highlighting the continuous evolution of software supply chain attacks targeting the open source ecosystem.

The packages in question are Ethers-Provider2 and Ethers-Providerz, the former has been downloaded 73 times since it was released on March 15, 2025. The second package, which was removed by the malware creators themselves, did not attract downloads.

“They were simple downloaders with malicious payloads cleverly hidden,” said Lucija Valentić, a researcher at ReversingLabs, in a report shared with Hacker News.

Cybersecurity

“The interesting part is in the second stage. This will “patch” the legitimate NPM package ether installed locally and have new files with malicious payloads. The patched file will ultimately provide a reverse shell. ”

This development marks a new escalation of threat actor tactics, as changes reside in common libraries and therefore does not compromise malicious features by uninstalling malformed packages. Additionally, if unsuspecting users remove the Ethers package when Ethers-Provider2 remains on the system, reinfection risks if the package is installed later again.

An analysis of Ethers-Provider2’s ReverSingLabs revealed that it is nothing more than a troilerized version of the widely used SSH2 NPM package, containing malicious payloads within install.js to retrieve two-stage malware from remote servers (“5.199.1666[.]1:31337/install “), write to a temporary file and run it.

As soon as you run, the temporary files are removed from the system to prevent the trace from leaving. The second stage payload begins an infinite loop in that part to check if NPM package ether is installed locally.

Malicious NPM Packages

If the package already exists or is newly installed, it works by replacing one of the files named “Provider-jsonrpc.js” with a fake version stuffed into additional code to get and run the third stage from the same server. The newly downloaded payload acts as a reverse shell that connects to the threat actor’s server via SSH.

“This means that connection with this client will turn into a reverse shell when you receive a custom message from the server,” Valentić says. “Even if package Ethers-Provider2 is removed from the compromised system, the client will still be used under certain circumstances and will provide some persistence to the attacker.”

At this stage, please note that the official Ethers package in the NPM registry is intact as malicious changes are installed locally.

Cybersecurity

The second package, Ethers-Providerz, works in a similar way in that it tries to modify the files associated with a locally installed NPM package called “@Ethersproject/Providers”. The exact NPM package the library targeted is unknown, but the source code reference indicates that it could have been roader.js.

The findings help threat actors highlight novel ways to deliver and sustain malware in their developer systems, and it is essential that they be carefully scrutinized before downloading and using packages in open source repository.

“These packages are strong and malicious despite the low number of downloads,” Valentić said. “If their mission is successful, they will destroy the package ether installed locally and will maintain the sustainability of the compromised system, even if the package is removed.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCoventry Building Society Arena has won the Green Tourism Award
Next Article Airbus accelerates the adoption of sustainable aviation fuels
user
  • Website

Related Posts

Large Android scam business has been revealed: Iconads, KaleIdoscope, SMS Malware, NFC Scams Identified apps are designed to load out-of-context ads on users’ screens and hide icons from the device’s home screen launcher, making it difficult for victims to remove them according to the company’s Satori Threat Intelligence and Research team. The app was then removed from the Play Store by Google. Advertising fraud schemes accounted for 1.2 billion bid requests per day due to their high activity. The majority of Iconads-related traffic comes from Brazil, Mexico and the United States. Iconads is a variant of the threat tracked by other cybersecurity vendors under the name Hiddedads and Vapor, and since at least 2019, malicious apps have been sliding around the Google Play Store repeatedly. Some of the common features of these apps include the use of obfuscation for concealment…

July 3, 2025

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Steal User Assets

July 3, 2025

The Hidden Weaknesses in AI SOC Tools that No One Talks About

July 3, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Large Android scam business has been revealed: Iconads, KaleIdoscope, SMS Malware, NFC Scams Identified apps are designed to load out-of-context ads on users’ screens and hide icons from the device’s home screen launcher, making it difficult for victims to remove them according to the company’s Satori Threat Intelligence and Research team. The app was then removed from the Play Store by Google. Advertising fraud schemes accounted for 1.2 billion bid requests per day due to their high activity. The majority of Iconads-related traffic comes from Brazil, Mexico and the United States. Iconads is a variant of the threat tracked by other cybersecurity vendors under the name Hiddedads and Vapor, and since at least 2019, malicious apps have been sliding around the Google Play Store repeatedly. Some of the common features of these apps include the use of obfuscation for concealment…

Ransomware Gang Hunter International says it’s shut down

Everything you need to know about Flash, Blueski-based Instagram alternatives

Eternal chemicals can affect the development of the brain in men

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.