Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Trojanized jQuery packages found in the npm, GitHub, and jsDelivr code repositories
Global Security

Trojanized jQuery packages found in the npm, GitHub, and jsDelivr code repositories

AdminBy AdminJuly 9, 2024No Comments2 Mins Read
Trojanized jQuery Packages
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 9, 2024Information hallSupply Chain Attack / Cybersecurity

Trojanized jQuery packages

Unknown threat actors were found to be distributing trojanized versions jQuery on npm, GitHub and jsDelivr in what appears to be an instance of a “sophisticated and persistent” supply chain attack.

“This attack stands out for its high variability between packets,” Phylum said in an analysis published last week.

“The attacker cleverly hid the malware in a rarely used”the end‘ a jQuery function that is called internally by the more popular ‘fadeTo‘ from its animation utility.”

Cyber ​​security

68 packages are tied to the promotion. They were published to the npm registry between May 26 and June 23, 2024, using names such as cdnjquery, footersicons, jquertyi, jqueryxxx, logoo, and sytlesheets, among others.

There is evidence to suggest that each of the fake packages was compiled and published manually due to the large number of packages published from different accounts, name differences, the inclusion of personal files, and the long period of time over which they were uploaded.

This differs from other common techniques where attackers tend to follow a predefined pattern that emphasizes the automation element involved in creating and publishing packages.

The malicious modification, according to the type, was made to a feature called “end” that allows a threat actor to steal website form data to a remote URL.

Further investigation revealed that the trojanized jQuery file resides in a GitHub repository associated with an account named “index.” Also present in the same repository are JavaScript files containing a script that points to a modified version of the library.

Cyber ​​security

“It’s worth noting that jsDelivr creates these GitHub URLs automatically without the need to upload anything to the CDN explicitly,” Fillum said.

“This is likely an attacker’s attempt to make the source look more legitimate or to sneak past a firewall using jsDelivr instead of downloading the code directly from GitHub itself.”

The development comes as Datadog identified a number of packages in the Python Package Index (PyPI) repository with capabilities to download a second-stage binary from an attacker-controlled server, depending on the processor architecture.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.