Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The malware company uses Ethereum smart contracts to control Typosquat’s npm packages
Global Security

The malware company uses Ethereum smart contracts to control Typosquat’s npm packages

AdminBy AdminNovember 5, 2024No Comments3 Mins Read
Ethereum Smart Contracts
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 5, 2024Ravi LakshmananMalware / Blockchain

Ethereum smart contracts

An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to force them to run cross-platform malware.

According to independent findings, the attack is characterized by the use of Ethereum smart contracts to distribute the addresses of command and control (C2) servers. Checkmarx, Typeand Socket published in the last few days.

This activity was first noted on October 31, 2024, although it is said to have occurred at least a week ago. At least 287 typosquat packages have been published in the npm package registry.

Cyber ​​security

“As this campaign began to take off in earnest, it became clear that this attacker was in the early stages of a typosquat campaign targeting developers intending to use the popular Puppeteer, Bignum.js, and various cryptocurrency libraries,” Fillum said.

The packages contain obfuscated JavaScript code that is executed during (or after) the installation process, which ultimately results in the retrieval of the next stage binary from a remote operating system-based server.

The binary, for its part, provides resilience and removes sensitive information associated with the compromised machine back to the same server.

But in an interesting twist, the JavaScript code interacts with the Ethereum smart contract using the ethers.js library to obtain the IP address. It should be noted here that the company is duplicated EtherHiding used a similar tactic, using Binance Smart Chain (BSC) contracts to advance to the next stage of the attack chain.

Blockchain’s decentralized nature means it’s harder to block a company, as the IP addresses served by the contract can be updated by threat actors over time, allowing malware to seamlessly connect to new IP addresses when old ones are blocked or removed.

“Using the blockchain in this way gives attackers two key advantages: their infrastructure becomes nearly impossible to destroy due to the immutable nature of the blockchain, and the decentralized architecture makes it extremely difficult to block these communications,” said Checkmarx researcher Yehuda Gelb. .

Cyber ​​security

It is currently unclear who is behind the campaign, although Socket’s threat research team said it found error messages written in Russian for exception handling and logging, suggesting the threat actor may have been Russian-speaking.

The development once again demonstrates new ways attackers are poisoning the open source ecosystem, requiring developers to be vigilant when downloading packages from software repositories.

“The use of blockchain technology for the C2 infrastructure presents a different approach to supply chain attacks in the npm ecosystem, making the attack infrastructure more resistant to dismantling attempts while making detection efforts more difficult,” Gelb said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025

Business -SUCKS FOR AGENTIC AI SOC -Analytics

June 27, 2025

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025

The Chinese Silver Fox Group uses fake web -sats to deliver Sainbox Rat and Hidden Rortkit

June 27, 2025

Business -SUCKS FOR AGENTIC AI SOC -Analytics

June 27, 2025

Transfer of person transfer is increased by threats when directed by scanning and disadvantages CVE

June 27, 2025

The malicious ONECLIK software is oriented

June 27, 2025

Critical Open VSX -no -register exposes millions of developers for supply chain attacks

June 26, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025

Posted and Pubshell Sarsware used in Tibet’s Mustang Panda attack

June 27, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.