Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Malicious NPM packages infect 3200+ users cursor with back, theft of credentials
Global Security

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

AdminBy AdminMay 9, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


09 May 2025Red LakshmananAttack of supply chain / malicious software

Cybersecurity researchers have indicated three malicious NPM packages that are designed to focus on the Apple MacOS Cursor version, a popular Apple MacOS source.

“Demanded into the developer tools offering” the cheapest API cursor “, these packages steal users’ powers, get encrypted useful load from infrastructure controlled by the threat – Note.

Under consideration packages are given below –

All three packages will still be available to download from the NPM registry. “AIIDE-CU” was first published on February 14, 2025. It was downloaded by the user called “AIIDE”. The NPM Library is described as a “Command Prompt Tool for Macos Editor -in -Chief”.

Cybersecurity

The other two packages according to the software chain safety were published a day earlier by the GTR2018 pseudonym. In total, three packages have been loaded more than 3200 times today.

After installing libraries, it is designed to collect the cursor credentials and obtaining the following stage of useful load from the remote server (“T.SW2031 (.) CE” or “Api.aiide (.) XYZ”), which is then used to replace the legitimate courso with angry logic.

“SW-C” also takes a step disabling the auto-update mechanism and stopping all cursor processes. The NPM packages then continue to restart the application to ensure that the secured code enters into force, giving the actor the threat to perform an arbitrary code in the context of the platform.

“This company emphasizes growing threats malicious spots To compromise the trusted local software, “Book.

The sale point here is that the attackers are trying to use developers’ interest in the II, as well as those looking for cheaper fees for using AI models.

“The use of the actor threatening” the cheapest API Cursor “is probably aimed at this group, with users promise at a quiet deployment of the back,” the researcher added.

The disclosure of information occurs when the socket discovered two more NPM packages – Pumptoolforvolumendcomment and debugging – to deliver a stubborn load that siphons of cryptocurrency keys, wallet files and trading data related to the crypto platform called BULLX on and Macos systems. Encouraged data exploited to the Telegram bot.

While “Pumptoolforvolumendcomment” was loaded 625 times, “Debugdogs” received only 119 downloads because they were published in NPM in September 2024. Olumidey.

“Debugdogs just causes Pumptoolforvolumendcomment, making it a convenient strain of secondary infection,” Kush Pande’s safety researcher – Note. “This” wrap “the sample doubles down the main attack, which facilitates the spread under several names without changing the malicious code.”

Cybersecurity

“This highly purposeful attack can empty your wallets and put sensitive credentials and trade data in seconds.”

Package NPM “Rand-User-Agent” compromised in the supply chain attack

The opening is also worth it report With Aikido about the supply chain attack that broke the legal package called “Rand-User-Agent“For the introduction of the code that hides the Trojan remote access (rat). Versions 2.0.83, 2.0.84 and 1.0.110 were recognized as malicious.

Recently released versions, according to Charlie Eriksen’s security researcher, designed to establish an external server communication to obtain teams that allow it to change the current work catalog, download files and execute Shell commands. The compromise was discovered on May 5, 2025.

At the time of writing the NPM package was marked out obsolete and related to this GitHub repository Also not available, redirect users to page 404.

It is currently unclear how the NPM package was broken to make unauthorized modifications. Users who have upgraded to 2.0.83, 2.0.84 or 1.0.110, it is recommended to lower it to the latest safe version released seven months ago (2.0.82). However, this does not remove malicious software from the system.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.