Deceptive npm Packages Discovered Using Picture Files to Conceal Backdoor Scripts

Jul 16, 2024NewsroomOpen Source / Software Supply Chain

Two deceitful packages have been pinpointed by cybersecurity analysts on the npm package registry, which disguised backdoor scripts to carry out harmful commands sent from a distant server.

Malicious npm Packages Found Using Image Files to Hide Backdoor Code

Jul 16, 2024NewsroomOpen Source / Software Supply Chain

Malicious npm Packages Found Using Image Files to Hide Backdoor Code

Two deceitful packages have been pinpointed by cybersecurity analysts on the npm package registry, which disguised backdoor scripts to carry out harmful commands sent from a distant server.

The respective packages – img-aws-s3-object-multipart-copy and legacyaws-s3-object-multipart-copy – have been acquired 190 and 48 times each. Presently, they have been removed by the npm security unit.

“These packages featured advanced command and control capabilities concealed within picture files that would get executed at the time of installing the package,” software supply chain security organization Phylum stated in an examination.

The packages were crafted to impersonate a valid npm library known as aws-s3-object-multipart-copy, albeit they arrived with a revised edition of the “index.js” script to execute a JavaScript file (“loadformat.js”).

Consequently, the JavaScript script is configured to handle three photos — showcasing the logos for Intel, Microsoft, and AMD — with the Microsoft logo image being leveraged to extract and enact the malicious content.

Cybersecurity

The operation functions by registering the new customer with a command-and-control (C2) server through transmitting the hostname and OS details. Subsequently, it endeavors to execute commands issued by the attacker at intervals of every five seconds.

In the ultimate phase, the results of the command execution are transmitted back to the attacker through a designated endpoint.

“Over the past few years, we’ve witnessed a notable surge in the sophistication and quantity of deceitful packages published to open source environments,” Phylum disclosed.

“These attacks have been rather effective. It is utterly crucial that developers and security entities remain acutely aware of this reality and maintain a high level of alertness pertaining to the open source libraries they utilize.”

Found this article intriguing? Stay tuned with us on Twitter and LinkedIn for more exclusive content updates.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.