Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The British Space Agency mission is set to clean up space debris

Chinese hackers abuse Ivanti CSA Zero Day in attacks on French government, communications

The EU accelerates its transition to a circular economy with new initiatives

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious NPM packages modify local “ether” libraries to launch reverse shell attacks
Identity

Malicious NPM packages modify local “ether” libraries to launch reverse shell attacks

userBy userMarch 26, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 26, 2025Ravi LakshmananSupply Chain Attacks/Malware

Malicious NPM Packages

Cybersecurity researchers have discovered two malicious packages in the NPM registry. It is designed to infect other locally installed packages, highlighting the continuous evolution of software supply chain attacks targeting the open source ecosystem.

The packages in question are Ethers-Provider2 and Ethers-Providerz, the former has been downloaded 73 times since it was released on March 15, 2025. The second package, which was removed by the malware creators themselves, did not attract downloads.

“They were simple downloaders with malicious payloads cleverly hidden,” said Lucija Valentić, a researcher at ReversingLabs, in a report shared with Hacker News.

Cybersecurity

“The interesting part is in the second stage. This will “patch” the legitimate NPM package ether installed locally and have new files with malicious payloads. The patched file will ultimately provide a reverse shell. ”

This development marks a new escalation of threat actor tactics, as changes reside in common libraries and therefore does not compromise malicious features by uninstalling malformed packages. Additionally, if unsuspecting users remove the Ethers package when Ethers-Provider2 remains on the system, reinfection risks if the package is installed later again.

An analysis of Ethers-Provider2’s ReverSingLabs revealed that it is nothing more than a troilerized version of the widely used SSH2 NPM package, containing malicious payloads within install.js to retrieve two-stage malware from remote servers (“5.199.1666[.]1:31337/install “), write to a temporary file and run it.

As soon as you run, the temporary files are removed from the system to prevent the trace from leaving. The second stage payload begins an infinite loop in that part to check if NPM package ether is installed locally.

Malicious NPM Packages

If the package already exists or is newly installed, it works by replacing one of the files named “Provider-jsonrpc.js” with a fake version stuffed into additional code to get and run the third stage from the same server. The newly downloaded payload acts as a reverse shell that connects to the threat actor’s server via SSH.

“This means that connection with this client will turn into a reverse shell when you receive a custom message from the server,” Valentić says. “Even if package Ethers-Provider2 is removed from the compromised system, the client will still be used under certain circumstances and will provide some persistence to the attacker.”

At this stage, please note that the official Ethers package in the NPM registry is intact as malicious changes are installed locally.

Cybersecurity

The second package, Ethers-Providerz, works in a similar way in that it tries to modify the files associated with a locally installed NPM package called “@Ethersproject/Providers”. The exact NPM package the library targeted is unknown, but the source code reference indicates that it could have been roader.js.

The findings help threat actors highlight novel ways to deliver and sustain malware in their developer systems, and it is essential that they be carefully scrutinized before downloading and using packages in open source repository.

“These packages are strong and malicious despite the low number of downloads,” Valentić said. “If their mission is successful, they will destroy the package ether installed locally and will maintain the sustainability of the compromised system, even if the package is removed.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCoventry Building Society Arena has won the Green Tourism Award
Next Article Airbus accelerates the adoption of sustainable aviation fuels
user
  • Website

Related Posts

Chinese hackers abuse Ivanti CSA Zero Day in attacks on French government, communications

July 3, 2025

A critical Cisco vulnerability in unified CM grants root access through static credentials

July 3, 2025

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The British Space Agency mission is set to clean up space debris

Chinese hackers abuse Ivanti CSA Zero Day in attacks on French government, communications

The EU accelerates its transition to a circular economy with new initiatives

A critical Cisco vulnerability in unified CM grants root access through static credentials

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.