thehackernews.com
Open in
urlscan Pro
2606:4700:20::681a:b75
Public Scan
URL:
https://thehackernews.com/2024/11/xmlrpc-npm-library-turns-malicious.html
Submission: On December 12 via api from IN — Scanned from US
Submission: On December 12 via api from IN — Scanned from US
Form analysis
2 forms found in the DOMGET https://www.google.com/cse
<form action="https://www.google.com/cse" id="searchform" method="get"><input autocomplete="off" id="s" name="q" placeholder="Search Here..." type="text">
<input name="cx" type="hidden" value="partner-pub-7983783048239650:3179771210">
</form>
Name: f1 — POST https://inl02.netline.com/rssnews0001/
<form action="https://inl02.netline.com/rssnews0001/" class="clear cf" id="subform" method="post" name="f1" target="_blank">
<div class="email-box-h3">Get Latest News in Your Inbox</div>
<p>Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.</p>
<div class="email-input">
<input name="_submit" type="hidden" value="0001">
<input id="brand" name="brand" type="hidden" value="thehackernews">
<div class="e-book"><input checked="yes" id="opt_001" name="opt_001" type="checkbox" value="Y"><input checked="yes" id="opt_003" name="opt_003" type="checkbox" value="Y"></div><label class="visuallyhidden" for="input-email">Email</label><input
class="text" id="input-email" name="email" placeholder="Your e-mail address" required="" type="email">
<button aria-label="Subscribe" id="submitform" type="submit" value="Subscribe"></button>
</div>
</form>
Text Content
#1 Trusted Cybersecurity News Platform Followed by 5.20+ million Subscribe – Get Latest News * Home * Newsletter * Webinars * Home * Data Breaches * Cyber Attacks * Vulnerabilities * Webinars * Expert Insights * Contact Resources * Webinars * THN Store * Free eBooks About Site * About THN * Jobs * Advertise with us Contact/Tip Us Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media RSS Feeds Email Alerts Telegram Channel XML-RPC NPM LIBRARY TURNS MALICIOUS, STEALS DATA, DEPLOYS CRYPTO MINER Nov 28, 2024Ravie LakshmananSoftware Security / Data Breach Cybersecurity researchers have discovered a software supply chain attack that has remained active for over a year on the npm package registry by starting off as an innocuous library and later adding malicious code to steal sensitive data and mine cryptocurrency on infected systems. The package, named @0xengine/xmlrpc, was originally published on October 2, 2023 as a JavaScript-based XML-RPC server and client for Node.js. It has been downloaded 1,790 times to date and remains available for download from the repository. Checkmarx, which discovered the package, said the malicious code was strategically introduced in version 1.3.4 a day later, harboring functionality to harvest valuable information such as SSH keys, bash history, system metadata, and environment variables every 12 hours, and exfiltrate it via services like Dropbox and file.io. "The attack achieved distribution through multiple vectors: direct npm installation and as a hidden dependency in a legitimate-looking repository," security researcher Yehuda Gelb said in a technical report published this week. The second approach involves a GitHub project repository named yawpp (short for "Yet Another WordPress Poster") that purports to be a tool designed to programmatically create posts on the WordPress platform. Its "package.json" file lists the latest version of @0xengine/xmlrpc as a dependency, thereby causing the malicious npm package to be automatically downloaded and installed when users attempt to set up the yawpp tool on their systems. It's currently not clear if the developer of the tool deliberately added this package as a dependency. The repository has been forked once as of writing. Needless to say, this approach is another effective malware distribution method as it exploits the trust users place in package dependencies. Once installed, the malware is designed to collect system information, establish persistence on the host through systemd, and deploy the XMRig cryptocurrency miner. As many as 68 compromised systems have been found to actively mine cryptocurrency through the attacker's Monero wallet. Furthermore, it's equipped to constantly monitor the list of running processes to check for the presence of commands like top, iostat, sar, glances, dstat, nmon, vmstat, and ps, and terminate all mining-related processes if found. It's also capable of suspending mining operations if user activity is detected. "This discovery serves as a stark reminder that a package's longevity and consistent maintenance history do not guarantee its safety," Gelb said. "Whether initially malicious packages or legitimate ones becoming compromised through updates, the software supply chain requires constant vigilance – both during initial vetting and throughout a package's lifecycle." The disclosure comes as Datadog Security Labs uncovered an ongoing malicious campaign targeting Windows users that uses counterfeit packages uploaded to both npm and the Python Package Index (PyPI) repositories with the end goal of deploying open-source stealer malware known as Blank-Grabber and Skuld Stealer. The company, which detected the supply chain attack last month, is tracking the threat cluster under the name MUT-8694 (where MUT stands for "mysterious unattributed threat"), stating it overlaps with a campaign that was documented by Socket earlier this month as aiming to infect Roblox users with the same malware. As many as 18 and 39 phony unique packages have been uploaded to npm and PyPI, with the libraries attempting to pass off as legitimate packages through the use of typosquatting techniques. "The use of numerous packages and involvement of several malicious users suggests MUT-8694 is persistent in their attempts to compromise developers," Datadog researchers said. "Contrary to the PyPI ecosystem, most of the npm packages had references to Roblox, an online game creation platform, suggesting that the threat actor is targeting Roblox developers in particular." UPDATE# The GitHub repository for the yawpp tool and its associated account are no longer accessible. Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post. SHARE Tweet Share Share Share Share on Facebook Share on Twitter Share on Linkedin Share on Reddit Share on Hacker News Share on Email Share on WhatsApp Share on Facebook Messenger Share on Telegram SHARE cryptocurrencycybersecuritydata breachGitHubJavaScriptMalwareNPMsoftware securitySupply Chain Trending News Protecting Tomorrow's World: Shaping the Cyber-Physical Future How to Plan a New (and Improved!) Password Policy for Real-World Security Challenges U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls The Future of Network Security: Automated Internal and External Pentesting Hackers Leveraging Cloudflare Tunnels, DNS Fast-Flux to Hide GammaDrop Malware Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts Microsoft Fixes 72 Flaws, Including Patch for Actively Exploited CLFS Vulnerability Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks Chinese EagleMsgSpy Spyware Found Exploiting Mobile Devices Since 2017 New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools Researchers Uncover Espionage Tactics of China-Based APT Groups in Southeast Asia Show More Popular Resources How to Get a Full Penetration Test Done in Days – See How It Works! [Watch] From Risk to ROI: The Strategic Value of Security Validation Backupify — The Backup Solution: Encrypted, Unlimited, Reliable Simplify IT Backup and Recovery — Experience Unitrends Live CYBERSECURITY WEBINARS Proven PAS Strategies LEARN HOW EXPERTS SECURE PRIVILEGED ACCOUNTS Discover proven strategies to secure privileged accounts and prevent escalation in this expert-led webinar. Claim Your Spot Learn from a CISO UNDERSTANDING BLIND SPOTS IN ADVANCED SECURITY SYSTEMS Learn why top organizations with advanced solutions still face breaches and how to fortify your defenses. Secure Your Webinar Access Breaking News Cybersecurity Resources Safeguard Your Sensitive Data Against Evolving Threats Learn key strategies to secure your SaaS environment. Your Security Checklist for AI-Powered SaaS The report covers AI SaaS risks like data usage, T&Cs, and compliance, plus a security checklist. Earn a Master's in Cybersecurity Risk Management Lead the future of cybersecurity risk management with an online Master's from Georgetown. Cloud Risk Self-Assessment Checklist Ready to secure your cloud? Easily evaluate and uncover cloud risk with this simple checklist to help strengthen your security posture. Expert Insights / Articles Videos 5 STRATEGIES TO COMBAT RANSOMWARE AND ENSURE DATA SECURITY IN MICROSOFT 365 December 2, 2024 Read ➝ SECURING OPEN SOURCE: LESSONS FROM THE SOFTWARE SUPPLY CHAIN REVOLUTION December 2, 2024 Read ➝ DEFENSIBLE SECURITY ARCHITECTURE AND ENGINEERING: DESIGNING AND BUILDING DEFENSES FOR THE FUTURE November 25, 2024 Read ➝ BREATHING NEW LIFE INTO A STAGNANT APPSEC November 14, 2024 Read ➝ Get Latest News in Your Inbox Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free. Email Connect with us! 925,500 Followers 610,100 Followers 22,800 Subscribers 145,000 Followers 1,890,500 Followers 138,5000 Subscribers Company * About THN * Advertise with us * Contact Pages * Webinars * Deals Store * Privacy Policy Deals * Hacking * Development * Android RSS Feeds Contact Us © The Hacker News, 2024. All Rights Reserved.