Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Wardle, White Sox, etc.: Fast facts about Pope Leo XIV

The world may be witnessing “another Naqba” in Palestine, UN Commission warns | Israeli-Palestinian conflict news

From Villanova to the Vatican: The alma mater is on the floor.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Malicious NPM packages use backdoors to infect over 3,200 cursor users and steal qualifications
Identity

Malicious NPM packages use backdoors to infect over 3,200 cursor users and steal qualifications

userBy userMay 9, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 9, 2025Ravi LakshmananSupply Chain Attacks/Malware

Cybersecurity researchers have flagged three malicious NPM packages designed to target the Apple MacOS version of Cursor, a source code editor powered by the popular AI (AI).

Troubled with developer tools that provide the “cheapest cursor API” these packages steal user credentials, get encrypted payloads from threat actor control infrastructure, overwrite the cursor’s main file, maintain persistence, disable autoconfiguration, and maintain tenacity.

The package in question is listed below –

All three packages can be downloaded from the NPM registry. “Aiide-Cur” was first released on February 14th, 2025. Uploaded by a user named “Aiide”. The NPM library is described as a “command line tool for configuring the MACOS version of the cursor editor.”

Cybersecurity

According to the software supply chain security company, the other two packages were released one day ago by threat actors under the alias “GTR2018.” In total, the three packages have been downloaded over 3,200 times so far.

The library is designed to harvest user-supported cursor credentials once installed and retrieve the next stage payload from the remote server (“T.SW2031[.]com “or” api.aiide[.]xyz “), it is used to replace legitimate cursor-specific code with malicious logic.

“SW-CUR” takes the first step of disabling the automatic cursor update mechanism and terminating all cursor processes. The NPM package proceeds to restarting the application so that the patched code is enabled, allowing threat actors to execute arbitrary code within the context of the platform.

“This campaign highlights the growing supply chain threat, prompting threat actors to use malicious patches to compromise on trustworthy local software,” Boychenko said.

The selling point here is that attackers are trying to take advantage of developers’ benefits for AI and those looking for cheaper royalties to access AI models.

“The use of the threat actor’s catchphrase, “The Cheap Cursor API,” may be targeting this group, seducing users with the promise of discounted access while quietly unfolding the backdoor,” the researchers added.

This disclosure occurred because sockets discovered two other NPM packages (Pumptoolforvolumeand and Debugdogs) and provided an obfuscated payload that siphoned up trading data related to cryptocurrency platforms called Macos Systems. The captured data is surrounded by telegram bots.

“Pumptoolforvolumeandcomment” was downloaded 625 times, but “Debugdogs” was published to NPM in September 2024 by a user named Olumideyo, resulting in a total of 119 downloads.

“DebugDogs simply calls Pumptoolforvolumeand Commment, which makes it a convenient payload for secondary infections,” said security researcher Kush Pandya. “This ‘wrapper’ pattern doubles in the main attack, making it easier to spread the malicious code in the core over multiple names without changing it. ”

Cybersecurity

“This highly targeted attack could empty your wallet and reveal sensitive credentials and transaction data in seconds.”

“Rand-User-Agent” NPM package breached by supply chain attacks

The discovery continues in Aikido’s report on supply chain attacks that compromise legitimate NPM packages called “Rand-User-Agent” and inject code that hides Remote Access Trojans (RATs). Versions 2.0.83, 2.0.84, and 1.0.110 are known to be malicious.

A newly released version for each security researcher Charlie Eriksen is designed to establish communication with external servers, change current working directory, upload files, and receive commands that allow you to execute shell commands. The compromise was detected on May 5, 2025.

At the time of writing, the NPM package has been removed, and the associated GitHub repository is no longer accessible, redirecting users to 404 pages.

It is currently unclear how the NPM package was violated to make unauthorized changes. Users who upgrade to 2.0.83, 2.0.84, or 1.0.110 are advised to downgrade to the last SAFE version (2.0.82) released seven months ago. However, doing so will not remove malware from your system.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHospitality Training Programme will be launched nationwide across the UK
Next Article Do you want to deploy an AI agent? Learn to secure them before hackers attack your business
user
  • Website

Related Posts

Breaking: EOL system dismantled in the US using 7,000 device proxy botnet IoT

May 9, 2025

OtterCookie V4 adds VM detection and Chrome, Metamask credential theft

May 9, 2025

Early Access Brokers are targeting Brazilian executives via NF-E spam and legal RMM trials

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Wardle, White Sox, etc.: Fast facts about Pope Leo XIV

The world may be witnessing “another Naqba” in Palestine, UN Commission warns | Israeli-Palestinian conflict news

From Villanova to the Vatican: The alma mater is on the floor.

US reports second air traffic control halt at New Jersey Airport | Donald Trump News

Trending Posts

The world may be witnessing “another Naqba” in Palestine, UN Commission warns | Israeli-Palestinian conflict news

May 9, 2025

US reports second air traffic control halt at New Jersey Airport | Donald Trump News

May 9, 2025

“I’ll run on you”: New FEMA Head Issues Warning to Trump Critics | Donald Trump News

May 9, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Former Northvolt CEO Peter Carlson secures funding for the company’s new AI manufacturing startup after bankruptcy

Celsius founder Alex Masski has been sentenced to 12 years in a crypto fraud that was ordered to pay $48 million

New dedicated blockchain T-Rex raises $17 million to convert the attention layer of Web3

Top tech startup funding news for today, May 8, 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.