Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Cyber Security

    Attackers Flood NPM Repository with Over 15,000 Spam Packages Containing Phishing Links

    justmattgBy justmattgFebruary 23, 2023No Comments3 Mins Read

    [ad_1]

    Feb 22, 2023Ravie LakshmananOpen Source / Supply Chain Attack

    NPM Repository

    In what’s a continuing assault on the open source ecosystem, over 15,000 spam packages have flooded the npm repository in an attempt to distribute phishing links.

    “The packages were created using automated processes, with project descriptions and auto-generated names that closely resembled one another,” Checkmarx researcher Yehuda Gelb said in a Tuesday report.

    “The attackers referred to retail websites using referral IDs, thus profiting from the referral rewards they earned.”

    The modus operandi involves poisoning the registry with rogue packages that include links to phishing campaigns in their README.md files, evocative of a similar campaign the software supply chain security firm exposed in December 2022.

    The fake modules masqueraded as cheats and free resources, with some packages named as “free-tiktok-followers,” “free-xbox-codes,” and “instagram-followers-free.”

    The ultimate goal of the operation is to entice users into downloading the packages and clicking on the links to the phishing sites with bogus promises of increased followers on social media platforms.

    “The deceptive web pages are well-designed and, in some cases, even include fake interactive chats that appear to show users receiving the game cheats or followers they were promised,” Gelb explained.

    NPM Repository

    The websites urge victims to fill out surveys, which then pave the way for additional surveys or, alternatively, redirect them to legitimate e-commerce portals like AliExpress.

    The packages are said to have been uploaded to npm from multiple user accounts within hours between February 20 and 21, 2023, using a Python script that automates the whole process.

    What’s more, the Python script is also engineered to append links to the published npm packages on WordPress websites operated by the threat actor that claim to offer Family Island cheats.

    This is achieved by using the selenium Python package to interact with the websites and make the necessary modifications.

    In all, the use of automation allowed the adversary to publish a large number of packages in a short span of time, not to mention create several user accounts to conceal the scale of the attack.

    “This shows the sophistication and determination of these attackers, who were willing to invest significant resources in order to carry out this campaign,” Gelb said.

    The findings once again demonstrate the challenges in securing the software supply chain, as threat actors continue to adapt with “new and unexpected techniques.”

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



    [ad_2]

    Source link

    Previous ArticleHalf of Apps Have High-Risk Vulnerabilities Due to Open Source
    Next Article Scammers Mimic ChatGPT to Steal Business Credentials
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑