• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
malicious npm package caught mimicking material tailwind css package

Malicious NPM Package Caught Mimicking Material Tailwind CSS Package

You are here: Home / General Cyber Security News / Malicious NPM Package Caught Mimicking Material Tailwind CSS Package
September 22, 2022

A malicious NPM package has been observed masquerading as the authentic software library for Materials Tailwind, once all over again indicating tries on the section of risk actors to distribute malicious code in open up supply application repositories.

Substance Tailwind is a CSS-centered framework advertised by its maintainers as an “uncomplicated to use elements library for Tailwind CSS and Materials Style and design.”

“The destructive Material Tailwind npm deal, although posing as a helpful development software, has an automated article-put in script,” Karlo Zanki, security researcher at ReversingLabs, explained in a report shared with The Hacker News.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

This script is engineered to obtain a password-secured ZIP archive file that has a Windows executable capable of running PowerShell scripts.

The rogue offer, named content-tailwindcss, has been downloaded 320 times to date, all of which transpired on September 15, 2022.

In a tactic that’s becoming ever more frequent, the risk actor appears to have taken enough care to mimic the features delivered by the original offer, although stealthily making use of a put up installation script to introduce the malicious attributes.

This normally takes the kind of a ZIP file retrieved from a remote server that embeds a Windows binary, which is supplied the identify “DiagnosticsHub.exe” probable in an endeavor to go off the payload as a diagnostic utility.

Malicious NPM PackageCode for stage 2 down load

Packed inside of the executable are Powershell code snippets accountable for command-and-manage, communication, process manipulation, and creating persistence by usually means of a scheduled process.

The typosquatted Materials Tailwind module is the most recent in a long listing of attacks concentrating on open up source computer software repositories like npm, PyPI, and RubyGems in the latest many years.

CyberSecurity

The attack also serves to emphasize the software offer chain as an attack area, which has risen in prominence owing to the cascading effect attackers can have by distributing malicious code that can wreak havoc across various platforms and organization environments in one go.

The supply chain threats have also prompted the U.S. govt to publish a memo directing federal agencies to “use only application that complies with protected application enhancement requirements” and attain “self-attestation for all 3rd-party software package.”

“Ensuring software program integrity is vital to defending Federal devices from threats and vulnerabilities and lessening in general risk from cyberattacks,” the White House said final 7 days.

Identified this posting exciting? Abide by THN on Facebook, Twitter  and LinkedIn to browse far more exclusive information we submit.


Some sections of this post are sourced from:
thehackernews.com

Previous Post: «linkedin’s smart links abused in phishing attack targeting slovakian users LinkedIn’s Smart Links abused in phishing attack targeting Slovakian users
Next Post: Russia-Based Hackers FIN11 Impersonate Zoom to Conduct Phishing Campaigns Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.