• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
malicious npm packages exfiltrate hundreds of developer ssh keys via

Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub

You are here: Home / General Cyber Security News / Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub
January 23, 2024

Two destructive offers learned on the npm package deal registry have been found to leverage GitHub to retailer Base64-encrypted SSH keys stolen from developer techniques on which they ended up put in.

The modules named warbeast2000 and kodiak2k have been printed at the begin of the month, attracting 412 and 1,281 downloads right before they ended up taken down by the npm maintainers. The most latest downloads occurred on January 21, 2024.

Software package supply chain security agency ReversingLabs, which manufactured the discovery, reported there were eight distinct versions of warbeast2000 and extra than 30 variations of kodiak2k.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Both of those the modules are developed to operate a postinstall script after set up, which is intended to retrieve and execute two different JavaScript data files.

Cybersecurity

Although warbeast2000 attempts to obtain the personal SSH critical, kodiak2k is developed to glimpse for a vital named “meow,” increasing the possibility that the danger actor probable used a placeholder title during the early levels of the improvement.

“This second phase malicious script reads the personal SSH essential stored in the id_rsa file found in the /.ssh listing,” security researcher Lucija Valentić claimed. “It then uploaded the Foundation64-encoded key to an attacker-managed GitHub repository.”

Subsequent versions of kodiak2k were being found to execute a script discovered in an archived GitHub project hosting the Empire write-up-exploitation framework. The script is capable of launching the Mimikatz hacking device to dump credentials from procedure memory.

“The marketing campaign is just the most up-to-date example of cybercriminals and destructive actors applying open source package deal managers and linked infrastructure to help malicious software program supply chain campaigns that goal progress corporations and close-consumer companies,” Valentić said.

Uncovered this posting attention-grabbing? Follow us on Twitter  and LinkedIn to read through extra distinctive content we post.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «"activator" alert: macos malware hides in cracked apps, targeting crypto “Activator” Alert: MacOS Malware Hides in Cracked Apps, Targeting Crypto Wallets
Next Post: VexTrio: The Uber of Cybercrime – Brokering Malware for 60+ Affiliates vextrio: the uber of cybercrime brokering malware for 60+»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.