Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

How Threat Hunting Builds Readiness

New study identifies recurrence risk for multiple myeloma patients

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » npm, PyPI, and RubyGems packages found to be sending developer data to Discord channels
Identity

npm, PyPI, and RubyGems packages found to be sending developer data to Discord channels

userBy userOctober 14, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 14, 2025Ravi LakshmananMalware/Typosquatting

Cybersecurity researchers have identified several malicious packages across the npm, Python, and Ruby ecosystems that leverage Discord as a command-and-control (C2) channel to send stolen data to actor-controlled webhooks.

Discord’s webhooks are a way to post messages to channels within the platform without requiring bot users or authentication, making them an attractive mechanism for attackers to exfiltrate data into channels under their control.

“The important thing is that webhook URLs are effectively write-only,” sockets researcher Olivia Brown said in her analysis. “Channel history is not made public, and defenders cannot reread previous posts just by knowing the URL.”

DFIR retainer service

The software supply chain security company announced that it has identified a number of packages that use Discord webhooks in a variety of ways.

mysql-dumpdiscord (npm). Siphon the contents of developer configuration files such as config.json, .env, ayarlar.js, ayarlar.json into a Discord webhook. nodejs.discord (npm). Discord webhooks may be used to log alerts (an approach that is not inherently malicious). malinssx, malicus, and maliinn (PyPI), using Discord as a C2 server by triggering an HTTP request to a channel whenever a package is installed using “pip install”.

“Exploiting Discord webhooks as a C2 is important because it reverses the economics of supply chain attacks,” Brown noted. “Because it’s free and fast, threat actors avoid hosting and maintaining their own infrastructure. They’re also often slipped into regular code and firewall rules, allowing them to be stolen even from secure victims.”

“When combined with install-time hooks and build scripts, a malicious package with the Discord C2 mechanism can silently siphon .env files, API keys, and host details from developer machines and CI runners long before runtime monitoring is aware of the app.”

Contagious Interview floods npm with fake packages

This disclosure comes after the company also flagged 338 malicious packages published by North Korean threat actors associated with the Contagious Interview campaign, reporting that rather than directly dropping JavaScript stealers and downloaders, they were being used to deliver cryptographic loaders that delivered malware families such as HexEval, XORIndex, and BeaverTail. In total, the package was downloaded more than 50,000 times.

“In this latest wave, North Korean threat actors executed more than a dozen command-and-control (C2) endpoints using more than 180 fake personas tied to new npm aliases and registration emails,” security researcher Kirill Boichenko said.

Targets of this campaign include Web3, cryptocurrency and blockchain developers, as well as job seekers in the technology sector, who will be approached for high-paying opportunities on professional platforms such as LinkedIn. Targeted candidates are then instructed to complete a coding assignment by cloning a booby-trapped repository that references a malicious package (such as eslint-detector) that has already been published to the npm registry.

CIS build kit

When run locally on a machine, the package referenced in the assumed project acts as a stealer (i.e. BeaverTail) and collects browser credentials, cryptocurrency wallet data, macOS keychain, keystrokes, clipboard contents, and screenshots. The malware is designed to download additional payloads, including a cross-platform Python backdoor codenamed InvisibleFerret.

Of the hundreds of packages uploaded by North Korean attackers, many are typosquats of legitimate packages (such as dotevn and dotenv), particularly those related to front-end frameworks such as Node.js, Express, or React. Some of the identified libraries were also found to be similar to the Web3 kit (such as ethrs.js and ethers.js).

“Contagious interviews operate more like an assembly line or factory model supply chain threat than a cybercriminal hobby,” Boychenko said. “This is a state-led, quota-driven operation using permanent resources, not weekend staff, and it is not enough to simply remove malicious packages if the associated publisher accounts remain active.”

“This campaign trajectory demonstrates a durable, factory-style operation that treats the npm ecosystem as a renewable early access channel.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleA horizontal shift in precision fermentation: The Horizon Bioreactor
Next Article Bringing new small hydropower solutions to Central Asia
user
  • Website

Related Posts

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025

How Threat Hunting Builds Readiness

October 14, 2025

A single 8-byte write shatters AMD’s SEV-SNP Confidential Computing security

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

How Threat Hunting Builds Readiness

New study identifies recurrence risk for multiple myeloma patients

A single 8-byte write shatters AMD’s SEV-SNP Confidential Computing security

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.