Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper
Global Security

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

AdminBy AdminMay 15, 2025No Comments3 Mins Read
Malicious npm Package
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 15, 2025Red LakshmananCriminal software / intelligence threats

NPM malicious package

Cybersecurity researchers have discovered a malicious package called “OS-Info-Checker-SES6”, which masks itself as a utilitis information about the operating system to stretch the useful load on the next stage for the impaired systems.

“This company uses reasonable Stegography based on Unicode to hide its original malicious code and uses a short Google Calendar Short link as a dynamic dropper for the final useful load,” the report that is shared with Hacker News said.

“OS-Info-Checker-ES6” was first published In the NPM register on March 19, 2025, a user called “Kim9123”. It was loaded 2.001 times as writing. The same user also has downloaded Another NPM packet called “Skip-Tot”, which lists “OS-Info-Checker-ES6” as dependence. Package Downloaded 94 times.

Cybersecurity

While the initial five versions did not show signs of data expressive or malicious behavior, the following iteration, loaded on May 7, 2025, included in the “Preinstall.js” file into the “Preinstall.js” file to break the unicode “private use of access” characters and gain the following stage load.

Somaroral code, on its part, is designed to contact a short reference Google Calendar Event (“Calendar.app (.) Google/“) Using a line coded Base64, as a title that deciphered to a remote server with the IP address” 140.82.54 (.) 223. “In other words, Google Calendar is a Detolish Dead Drop To clog the infrastructure controlled by the attacker.

NPM malicious package

However, at this point, no additional useful loads are applied. This either indicates that the company is either still working or at the moment. Another opportunity is that it was already consisted or that the team and control server (C2) are intended to respond only to certain machines that meet certain criteria.

“Such use of legitimate, widely trusted service, such as Google Calendar as a mediator for the next C2 link, is a reasonable tactic for evading the detection and debris of the initial stages,” Verokod said.

NPM malicious package

Application Security and Aikido, which also minute In the future, the activity noted that three more packages listed “OS-Info-Checker-ES6” as a dependence, although it is suspected that dependent packages are part of one company–

  • Dev-Terverr View
  • View-view
  • View-bit
Cybersecurity

“The OS-Info-Checker-ES6 package is a complex and a threat to the NPM ecosystem,” said Veracod. “The attacker demonstrated progress from obvious testing to multi -stage malware.”

The disclosure of information occurs when the software safety company has highlighted the outlet for printing, voices abuse, abuse, plunging, multi -stage execution, plaques and abuse of legal services and developers as six major competitive methods adopted by subjects in the first half of 2025.

“To resist this, the defenders must focus on behavioral signals such as unexpected Postinstall scripts, file topritees and unauthorized travel traffic, when checking the packets third – Note.

“The static and dynamic analysis, the consolidation of the versions and a thorough review of CI/CD magazines are important for the detection of malicious dependencies before they achieve production.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.