Close Menu
geekfence.comgeekfence.com
    What's Hot

    Samsung Galaxy S27: Rumours, Price, Release Date

    April 22, 2026

    60 of the Best TV Shows on Netflix That Will Keep You Entertained

    April 22, 2026

    OPPO Find X9 Ultra Launched: Price and Specifications

    April 22, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux
    Cyber Security

    10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux

    AdminBy AdminOctober 29, 2025No Comments3 Mins Read1 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Oct 29, 2025Ravie LakshmananMalware / Threat Intelligence

    10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux

    Cybersecurity researchers have discovered a set of 10 malicious npm packages that are designed to deliver an information stealer targeting Windows, Linux, and macOS systems.

    “The malware uses four layers of obfuscation to hide its payload, displays a fake CAPTCHA to appear legitimate, fingerprints victims by IP address, and downloads a 24MB PyInstaller-packaged information stealer that harvests credentials from system keyrings, browsers, and authentication services across Windows, Linux, and macOS,” Socket security researcher Kush Pandya said.

    The npm packages were uploaded to the registry on July 4, 2025, and accumulated over 9,900 downloads collectively –

    • deezcord.js
    • dezcord.js
    • dizcordjs
    • etherdjs
    • ethesjs
    • ethetsjs
    • nodemonjs
    • react-router-dom.js
    • typescriptjs
    • zustand.js
    DFIR Retainer Services

    The multi-stage credential theft operation manifested in the form of various typosquatted packages impersonating popular npm libraries such as TypeScript, discord.js, ethers.js, nodemon, react-router-dom, and zustand.

    Once installed, the malware serves a fake CAPTCHA prompt and displays authentic-looking output that mimics legitimate package installations to give the impression that the setup process is proceeding along expected lines. However, in the background, the package captures the victim’s IP address, sends it to an external server (“195.133.79[.]43”), and then proceeds to drop the main malware.

    In each package, the malicious functionality is automatically triggered upon installation by means of a postinstall hook, launching a script named “install.js” that detects the victim’s operating system and launches an obfuscated payload (“app.js”) in a new Command Prompt (Windows), GNOME Terminal or x-terminal-emulator (Linux), or Terminal (macOS) window.

    “By spawning a new terminal window, the malware runs independently of the npm install process,” Pandya noted. “Developers who glance at their terminal during installation see a new window briefly appear, which the malware immediately clears to avoid suspicion.”

    The JavaScript contained within “app.js” is hidden through four layers of obfuscation — such as XOR cipher with a dynamically generated key, URL-encoding of the payload string, and using hexadecimal and octal arithmetic to obscure program flow — that are designed to resist analysis.

    The end goal of the attack is to fetch and execute a comprehensive information stealer (“data_extracter”) from the same server that’s equipped to thoroughly scan the developer’s machine for secrets, authentication tokens, credentials, and session cookies from web browsers, configuration files, and SSH keys.

    CIS Build Kits

    The stealer binary also incorporates platform-specific implementations to extract credentials from the system keyring using the keyring npm library. The harvested information is compressed into a ZIP archive and exfiltrated to the server.

    “System keyrings store credentials for critical services including email clients (Outlook, Thunderbird), cloud storage sync tools (Dropbox, Google Drive, OneDrive), VPN connections (Cisco AnyConnect, OpenVPN), password managers, SSH passphrases, database connection strings, and other applications that integrate with the OS credential store,” Socket said.

    “By targeting the keyring directly, the malware bypasses application-level security and harvests stored credentials in their decrypted form. These credentials provide immediate access to corporate email, file storage, internal networks, and production databases.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Cisco ThousandEyes Cloud Insights | Network Visibility, Compliance & Cost Management

    April 22, 2026

    Singer loses life savings to fake wallet downloaded from the Apple App Store

    April 21, 2026

    Protecting Cookies with Device Bound Session Credentials

    April 20, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    [Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data

    April 18, 2026

    Patch Tuesday, April 2026 Edition – Krebs on Security

    April 17, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202531 Views

    Redefining AI efficiency with extreme compression

    March 25, 202625 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202625 Views
    Don't Miss

    Samsung Galaxy S27: Rumours, Price, Release Date

    April 22, 2026

    Summary created by Smart Answers AIIn summary:Tech Advisor reports that Samsung’s Galaxy S27 series is…

    60 of the Best TV Shows on Netflix That Will Keep You Entertained

    April 22, 2026

    OPPO Find X9 Ultra Launched: Price and Specifications

    April 22, 2026

    Train, Serve, and Deploy a Scikit-learn Model with FastAPI

    April 22, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Samsung Galaxy S27: Rumours, Price, Release Date

    April 22, 2026

    60 of the Best TV Shows on Netflix That Will Keep You Entertained

    April 22, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.