Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Explain why hackers who exposed the North Korean government did that

UK Industrial Strategy Boosts Science and Technology in Northern Ireland

Hackers spreading Agent Tesla, Asyncrat and Snake KeyLogger using the new QuirkyLoader malware

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious PYPI and NPM packages have been discovered to exploit the dependencies of supply chain attacks
Identity

Malicious PYPI and NPM packages have been discovered to exploit the dependencies of supply chain attacks

userBy userAugust 18, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have discovered malicious packages in the Python Package Index (PYPI) repository. This introduces malicious behavior through dependencies that can establish persistence and enable code execution.

A package named Themcolor delivers its creepy functionality through a dependency package called Colorinal with multi-stage malware operations, Zscaler Threatlabz said. While Termcolor has been downloaded 355 times, Colorinal attracted 529 downloads. Both libraries are no longer available for Pypi.

“This attack could leverage DLL sideloads to promote decoding, establish persistence, implement command and control (C2) communication and end with remote code execution,” said researchers Manisha Ramcharan Prajapati and Satyam Singh.

Once installed and run, TermnColor is designed to import Colorinal and loads the Rogue DLL responsible for decrypting and running the next stage payload.

Specifically, the payload unpacks the legitimate binary “vcpktsvr.exe” and a DLL called “libcef.dll” that is launched using the DLL sideload. In that part, the DLL can collect system information and communicate with the C2 server using Zulip, an open source chat application, to hide activity.

“Permanence is achieved by creating a registry entry under the Windows Run key to ensure that the malware runs automatically at the system startup,” Zscaler said.

Malware can also infect Linux systems. The Python library unlocks the same functionality by removing shared object files called “Terminate.so”.

Cybersecurity

Further analysis of threat actors’ Zulip activities revealed three active users within the created organization, exchanging a total of 90,692 messages within the platform. The malware author is believed to have been active since July 10th, 2025.

“The term package and its malicious dependency qualinal underscore the importance of monitoring the open force ecosystem for potential supply chain attacks,” the company said.

As Slowmist reveals that threat actors are targeting developers, it expands the details of the external server by targeting developers under job assessments by cloned Github repository containing booby-trap NPM packages that can harvest iCloud keychains, web browsers and Cryptocurrency Wallet data.

The NPM package is designed to download and run Python scripts, capture system information, scan file systems for sensitive files, steal credentials, steal log keystrokes, take screenshots, and monitor clipboard content.

The list of identified packages has now been removed from NPM, but can be found below –

Redux-ace (163 downloads) RTK-Logger (394 downloads)

In recent months, malicious NPM packages targeting the cybersecurity community have been discovered to promote data theft and cryptocurrency mining via dependent packages to remove information from infected systems using legitimate services such as Dropbox.

Datadog researchers Christophe Tafani-Dereeeper and Matt Muir said these packages are distributed to targets under the guise of malicious proof-of-concept (POC) code for security flaws or kernel patches that provide performance improvements. This activity is attributed to a threat actor that tracks it as MUT-1244.

This development continues with a ReversingLab report that identifies the risks associated with automated dependency upgrades, especially when compromised projects are used in thousands of other projects, if they amplify software supply chain risks.

Identity Security Risk Assessment

This is exemplified by a recent compromise in the ESLINT-CONFIG-PRETTIER NPM package by a phishing attack that allows unnamed attackers to push directly to the NPM registry without committing or pull requests from the corresponding Github repository.

The software supply chain security company has discovered that over 14,000 packages declare ESLINT-Config-Prettier as a direct dependency.

“Because this is a configuration of the development tool used to format the code, we expect it to need to be declared as developer dependent across the packages used. Therefore, it should not be automatically installed when the NPM install command is executed in the same way as a regular dependency.

“Automatic version control tools like Depenabot are designed to remove risks that have dependencies on security issues in the codebase, […] Ironically, they will introduce even bigger security issues, such as malicious compromises. ”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUK expands plug-in van and truck grants until 2027
Next Article Openai’s ChatGpt agent can control your PC and perform tasks on your behalf, but how does it work and what’s the point?
user
  • Website

Related Posts

Hackers spreading Agent Tesla, Asyncrat and Snake KeyLogger using the new QuirkyLoader malware

August 21, 2025

Important findings from Blue Report 2025

August 21, 2025

Scattered spider hackers win $13 million in reparations for SIMs replacing Crypto theft for 10 years

August 21, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Explain why hackers who exposed the North Korean government did that

UK Industrial Strategy Boosts Science and Technology in Northern Ireland

Hackers spreading Agent Tesla, Asyncrat and Snake KeyLogger using the new QuirkyLoader malware

Important findings from Blue Report 2025

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.