• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers uncover malicious npm packages stealing data from apps and

Researchers Uncover Malicious NPM Packages Stealing Data from Apps and Web Forms

You are here: Home / General Cyber Security News / Researchers Uncover Malicious NPM Packages Stealing Data from Apps and Web Forms
July 5, 2022

A common program provide chain attack has qualified the NPM package deal supervisor at minimum given that December 2021 with rogue modules created to steal information entered in sorts by end users on web-sites that incorporate them.

The coordinated attack, dubbed IconBurst by ReversingLabs, consists of no less than two dozen NPM packages that include things like obfuscated JavaScript, which arrives with destructive code to harvest delicate information from kinds embedded downstream mobile applications and websites.

“These clearly malicious attacks relied on typo-squatting, a system in which attackers present up deals by means of community repositories with names that are comparable to — or typical misspellings of — respectable packages,” security researcher Karlo Zanki said in a Tuesday report. “Attackers impersonated higher-visitors NPM modules like umbrellajs and offers printed by ionic.io.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The packages in problem, most of which ended up posted in the previous months, have been collectively downloaded a lot more than 27,000 moments to date. Worse, a vast majority of the modules keep on to be obtainable for down load from the repository.

Some of the most down load malicious modules are outlined under –

  • icon-package deal (17,774)
  • ionicio (3,724)
  • ajax-libs (2,440)
  • footericon (1,903)
  • umbrellaks (686)
  • ajax-library (530)
  • pack-icons (468)
  • icons-package (380)
  • swiper-bundle (185), and
  • icons-deals (170)

In just one instance observed by ReversingLabs, information exfiltrated by icon-package deal was routed to a area named ionicio[.]com, a lookalike web page engineered to resemble the authentic ionic[.]io website.

CyberSecurity

The malware authors behind the campaign additional switched up their tactics in the latest months to assemble information from each form element on the web page, indicating an intense technique to information harvesting.

“The decentralized and modular mother nature of software growth usually means that programs and expert services are only as potent as their the very least secure component,” Zanki noted. “The achievement of this attack […] underscores the freewheeling mother nature of application advancement, and the minimal barriers to destructive or even susceptible code entering sensitive apps and IT environments.”

Discovered this write-up exciting? Stick to THN on Fb, Twitter  and LinkedIn to examine more unique information we put up.


Some sections of this posting are sourced from:
thehackernews.com

Previous Post: «pro china group uses dragonbridge campaign to target rare earth mining Pro-China Group Uses Dragonbridge Campaign to Target Rare Earth Mining Companies
Next Post: Advanced Phishing Scams Target Middle East and Impersonate UAE Ministry of Human Resources Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.