Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google settles with Epic Games, lowers Play Store fees to 20%

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

US military still uses Claude, but defense technology customers are fleeing

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » RogueNPM Package Imitation Telegram Bot API Imitation to Plant SSH Backdoors in Linux Systems
Identity

RogueNPM Package Imitation Telegram Bot API Imitation to Plant SSH Backdoors in Linux Systems

userBy userApril 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 19, 2025Ravi LakshmananLinux/Malware

Cybersecurity researchers have discovered three malicious packages in the NPM registry. It pretends to be a popular telegram bot library, but has SSH backdoors and data removal capabilities.

The package in question is listed below –

Cybersecurity

According to supply chain security company Socket, the package is designed to mimic the Node-Telegram-Bot-API, the popular Node.js Telegram Bot API with over 100,000 downloads per week. Three libraries are still available for download.

“The numbers may sound modest, but they only need one compromised environment to pave the way for widespread penetration or unauthorized access to data,” said security researcher Kush Pandya.

“Supply chain security incidents have repeatedly shown that even a handful of installations can have catastrophic effects, especially if an attacker has direct access to a developer system or production server.”

The Rogue package not only reproduces legitimate library descriptions, but also utilizes a technique called Starjacking to increase reliability and trick and download unsuspecting developers.

Starjacking refers to an approach in which open source packages are created to become more popular by linking GitHub repositories associated with legitimate libraries. This typically takes advantage of non-existent validation of the relationship between the package and the GitHub repository.

SSH backdoor for Linux systems

Socket analysis shows that the package is designed to work explicitly on Linux systems, and adds two SSH keys to the “~/.ssh/Authorized_keys” file, giving the attacker permanent remote access to the host.

The script is designed to contact “ipinfo” to collect the system username and external IP address[.]io/ip. “It also issues a beacon to an external server (” solana.validator[.]Blog “) Confirm infection.

The inserted SSH key gives free remote access to threat access for subsequent code execution and data stripping, so making the package despicable is not to completely eliminate the threat.

Cybersecurity

This disclosure comes when the socket details another malicious package named @naderabdi/merchant-advcash. It is designed to launch a reverse shell on a remote server, disguised as a Volet (formerly Advcash) integration.

“The package @naderabdi/merchant-advcash contains hardcoded logic that opens a reverse shell to a remote server upon invoking a payment successful handler,” the company said. “It’s disguised as a utility for merchants to receive, verify and manage cryptocurrency or Fiat payments.”

“Unlike many malicious packages that run code during installation or import, this payload is delayed until runtime, especially after successful transactions. This approach helps to avoid detection as malicious code only runs under certain runtime conditions.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUS VP Vance discusses the troublesome issues of migration with the Vatican | Religious News
Next Article Iran checks progress on nuclear talks with us, next week’s third round | News
user
  • Website

Related Posts

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

March 4, 2026

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

March 4, 2026

New RFP template for AI usage control and AI governance

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google settles with Epic Games, lowers Play Store fees to 20%

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

US military still uses Claude, but defense technology customers are fleeing

X taps William Shatner to distribute an invitation to his payment service X Money

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.