Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CL-STA-0969 installs secret malware on telecom networks during 10 months of spying

New “Pest” PAM Backdoor exposes critical Linux systems to silent qualification theft

What should the founder think about if they are trying to raise the series c?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious NPM packages use backdoors to infect over 3,200 cursor users and steal qualifications
Identity

Malicious NPM packages use backdoors to infect over 3,200 cursor users and steal qualifications

userBy userMay 9, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 9, 2025Ravi LakshmananSupply Chain Attacks/Malware

Cybersecurity researchers have flagged three malicious NPM packages designed to target the Apple MacOS version of Cursor, a source code editor powered by the popular AI (AI).

Troubled with developer tools that provide the “cheapest cursor API” these packages steal user credentials, get encrypted payloads from threat actor control infrastructure, overwrite the cursor’s main file, maintain persistence, disable autoconfiguration, and maintain tenacity.

The package in question is listed below –

All three packages can be downloaded from the NPM registry. “Aiide-Cur” was first released on February 14th, 2025. Uploaded by a user named “Aiide”. The NPM library is described as a “command line tool for configuring the MACOS version of the cursor editor.”

Cybersecurity

According to the software supply chain security company, the other two packages were released one day ago by threat actors under the alias “GTR2018.” In total, the three packages have been downloaded over 3,200 times so far.

The library is designed to harvest user-supported cursor credentials once installed and retrieve the next stage payload from the remote server (“T.SW2031[.]com “or” api.aiide[.]xyz “), it is used to replace legitimate cursor-specific code with malicious logic.

“SW-CUR” takes the first step of disabling the automatic cursor update mechanism and terminating all cursor processes. The NPM package proceeds to restarting the application so that the patched code is enabled, allowing threat actors to execute arbitrary code within the context of the platform.

“This campaign highlights the growing supply chain threat, prompting threat actors to use malicious patches to compromise on trustworthy local software,” Boychenko said.

The selling point here is that attackers are trying to take advantage of developers’ benefits for AI and those looking for cheaper royalties to access AI models.

“The use of the threat actor’s catchphrase, “The Cheap Cursor API,” may be targeting this group, seducing users with the promise of discounted access while quietly unfolding the backdoor,” the researchers added.

This disclosure occurred because sockets discovered two other NPM packages (Pumptoolforvolumeand and Debugdogs) and provided an obfuscated payload that siphoned up trading data related to cryptocurrency platforms called Macos Systems. The captured data is surrounded by telegram bots.

“Pumptoolforvolumeandcomment” was downloaded 625 times, but “Debugdogs” was published to NPM in September 2024 by a user named Olumideyo, resulting in a total of 119 downloads.

“DebugDogs simply calls Pumptoolforvolumeand Commment, which makes it a convenient payload for secondary infections,” said security researcher Kush Pandya. “This ‘wrapper’ pattern doubles in the main attack, making it easier to spread the malicious code in the core over multiple names without changing it. ”

Cybersecurity

“This highly targeted attack could empty your wallet and reveal sensitive credentials and transaction data in seconds.”

“Rand-User-Agent” NPM package breached by supply chain attacks

The discovery continues in Aikido’s report on supply chain attacks that compromise legitimate NPM packages called “Rand-User-Agent” and inject code that hides Remote Access Trojans (RATs). Versions 2.0.83, 2.0.84, and 1.0.110 are known to be malicious.

A newly released version for each security researcher Charlie Eriksen is designed to establish communication with external servers, change current working directory, upload files, and receive commands that allow you to execute shell commands. The compromise was detected on May 5, 2025.

At the time of writing, the NPM package has been removed, and the associated GitHub repository is no longer accessible, redirecting users to 404 pages.

It is currently unclear how the NPM package was violated to make unauthorized changes. Users who upgrade to 2.0.83, 2.0.84, or 1.0.110 are advised to downgrade to the last SAFE version (2.0.82) released seven months ago. However, doing so will not remove malware from your system.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHospitality Training Programme will be launched nationwide across the UK
Next Article Do you want to deploy an AI agent? Learn to secure them before hackers attack your business
user
  • Website

Related Posts

CL-STA-0969 installs secret malware on telecom networks during 10 months of spying

August 2, 2025

New “Pest” PAM Backdoor exposes critical Linux systems to silent qualification theft

August 2, 2025

Akira ransomware exploits Sonic Wall VPN with zero-day attacks on fully patched devices

August 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CL-STA-0969 installs secret malware on telecom networks during 10 months of spying

New “Pest” PAM Backdoor exposes critical Linux systems to silent qualification theft

What should the founder think about if they are trying to raise the series c?

Akira ransomware exploits Sonic Wall VPN with zero-day attacks on fully patched devices

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.