Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A malicious obfuscated NPM package disguised as an Ethereum tool deploys the Quasar RAT
Global Security

A malicious obfuscated NPM package disguised as an Ethereum tool deploys the Quasar RAT

AdminBy AdminJanuary 2, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Cybersecurity researchers discovered a malicious package in the npm package registry that pretends to be a library for detecting vulnerabilities in Ethereum smart contracts, but actually drops an open-source remote access trojan called Quasar RAT onto developer systems.

A highly confusing package called ethereumvulncontracthandlerwas published to npm on Dec 18, 2024. by a user named “solidit-dev-416”. At the time of writing, it is still available for download. It was downloaded 66 times to date.

“Once installed, it retrieves a malicious script from a remote server, executing it silently to deploy the RAT on Windows systems,” Socket security researcher Kirill Boichenko said in an analysis published last month.

The malicious code embedded in the ethereumvulncontracthandler is hidden with multiple layers of obfuscation using techniques such as Base64 and XOR encoding, as well as minification to resist analysis and detection attempts.

The malware also performs checks to avoid sandboxing before impersonating a bootloader, retrieving and executing the second-stage payload from a remote server (“jujuju(.)lat”). The script is designed to run PowerShell commands to initiate Quasar RAT execution.

Cyber ​​security

The Remote Access Trojan, for its part, establishes security through modifications to the Windows registry and contacts the Command and Control (C2) server (“captchacdn(.)com:7000”) to receive further instructions that allow it to collect and steal information. .

Quasar RAT, the first publicly released on GitHub in July 2014, was used for both cybercrime and cyber espionage companies by various threat actors over the years.

“The threat actor also uses this C2 server to catalog infected machines and manage multiple compromised nodes at the same time if that company is part of a botnet infection,” Boychanka said.

“At this stage, the victim’s machine is fully compromised and under full surveillance and control by the threat actor, ready to regularly log in and receive updated instructions.”

The issue of fake stars on GitHub

A new study by Socket, along with researchers at Carnegie Mellon University and North Carolina State University, has found a rapid spike in the number of fake “stars” being used to artificially boost the popularity of GitHub repositories with malware.

While phenomenon was around for a whileresearch has shown that most fake stars are used to promote short-lived malware repositories masquerading as pirated software, game codes, and cryptocurrency bots.

Promoted through GitHub star traders such as Baddhi Shop, BuyGitHub, FollowDeh, R for Rank and Twidium, the “open” black market is believed to be behind 4.5 million “fake” stars from 1.32 million accounts and spans 22,915 storage, which illustrates the scale of the problem.

Baddhi ShopHacker news foundallows potential customers to buy 1,000 GitHub stars for $110. “Buy followers, stars, forks, and followers on GitHub to increase the authority and visibility of your repository,” the site’s description reads. “Real engagement attracts more developers and contributors to your project!”

“Only a few repositories with fake star companies are published in package registries such as npm and PyPI,” the researchers note. said. “Widely accepted even less. At least 60% of accounts involved in fake star campaigns have trivial activity patterns.”

As the open source software supply chain continues to be an attractive vector for cyberattacks, the results confirm that the number of stars alone is an unreliable signal of quality or reputation and should not be used without further verification.

Cyber ​​security

In a statement provided to WIRED in October 2023, the Microsoft-owned code hosting platform said it has known about the problem for years and is actively working to remove fake stars from the service.

“The main vulnerability of the star count as a metric is that the actions of all GitHub users are weighted equally in its determination,” the researchers said.

“As a result, as we have shown in our research, the number of stars can easily be inflated by a large number of bot accounts or (perhaps with low reputation) crowdsourced people. To avoid such exploitation, GitHub may consider providing a weighted metric for the signal repository. popularity (e.g. based on measures of network centrality) that are much harder to fake.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.