Deceptive NPM Packages Aim at Roblox Users with Spyware
An ongoing campaign has singled out the npm package repository with deceitful JavaScript collections that are crafted to corrupt Roblox users with open-source spyware like Skuld and Blank-Grabber.
“The recent event showcases the concerning simplicity with which threat actors can initiate supply chain assaults by leveraging trust and human oversight within the open source ecosystem, and using readily accessible off-the-shelf malware, public platforms like GitHub for hosting malicious executables, and communication channels like Discord and Telegram for C2 activities to bypass conventional security measures,” Socket security analyst Kirill Boychenko commented in a report shared with The Hacker News.
The enumeration of malevolent packages is as follows –
doubly linked list framework for JavaScript. In a similar manner, rolimons-api is a misleading adaptation of Rolimon’s API.
“Although unofficial wrappers and modules exist — like the rolimons Python bundle (downloaded over 17,000 times) and the Rolimons Lua component on GitHub — the malicious rolimons-api packages endeavored to exploit developers’ reliance on recognizable titles,” Boychenko mentioned.
The rogue bundles embed concealed code that fetches and implements Skuld and Blank Grabber, spyware lineages drafted in Golang and Python, correspondingly, that can gather a broad array of data from compromised systems. The accrued data is then transmitted to the attacker via Discord webhook or Telegram.
To outmaneuver security safeguards, the malware binaries are fetched from a GitHub repository (“github[.]com/zvydev/code/”) managed by the threat actor.
The increased popularity of Roblox in recent times has spurred threat actors to actively propagate counterfeit packages to target developers and users alike. Earlier this year, several fraudulent bundles like noblox.js-proxy-server, noblox-ts, and noblox.js-async were observed mimicking the prominent noblox.js library.
With malicious actors leveraging trust in commonly used packages to promote typosquatted packages, developers are urged to verify bundle names and meticulously examine source code before downloading.
“As open-source ecosystems expand and more developers depend on shared code, the threat landscape widens, with threat actors hunting for more opportunities to insert malicious code,” Boychenko highlighted. “This event underscores the necessity for heightened vigilance and robust security practices among developers.”



