Skip to content
  Tuesday 20 January 2026
Trending
May 31, 2025New Linux Vulnerabilities Enable Password Theft in Ubuntu, RHEL, Fedora via Core Dumps February 19, 2024Achieving Optimal Risk-Based Alerting without SIEM January 16, 2026Siemens Industrial Edge Device Kit April 18, 2024Unitronics Vision Series PLCs | CISA November 21, 2025Cybersecurity Risk Analyst, Mid May 23, 2025Cybersecurity Engineer lll – 90k – 160k/annually March 13, 2024Chief Cybersecurity Engineer December 6, 2024Russian Programmer Under Surveillance by FSB Using Trojan App December 12, 2025RMF/ISSO Cybersecurity Engineer February 20, 2025North Korean Cyber Hackers Target Freelancers in Job Scam for Malware Deployment
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  70+ Malicious Packages in npm & VS Code Stealing Data and Crypto!
Industry News

70+ Malicious Packages in npm & VS Code Stealing Data and Crypto!

SecuredyouadmSecuredyouadm—May 26, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

AI Security: White House Releases Comprehensive Executive Order

October 30, 2023

ScarCruft Strikes South Korean Academics with RokRAT Malware in Operation HanKook Phantom

September 1, 2025

Virtual Oven Alert: Have You Switched it Off?

August 14, 2025

Breakthrough Unveiled: Researchers Introduce ‘FortiJumpHigher’

November 14, 2024



A recent discovery has shed light on as many as 60 malicious npm packages found in the package registry, equipped with functionality to extract hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint. Socket security researcher Kirill Boychenko revealed that these packages, published under three different accounts, have been downloaded over 3,000 times. The install-time script included in these packages is capable of targeting Windows, macOS, or Linux systems, making them potentially dangerous for any infected workstation or continuous-integration node.

The three accounts responsible for publishing these malicious npm packages are bbbb335656, cdsfdfafd1232436437, and sdsds656565, all of which have since been taken down from npm. The code embedded in these packages is designed to fingerprint every machine that installs them and communicates the gathered information to a Discord webhook. This data includes host details, system DNS servers, network interface card (NIC) information, and internal and external IP addresses, enabling threat actors to map networks and identify valuable targets for future attacks.

In addition to the malicious npm packages, a set of eight npm packages masquerading as helper libraries for JavaScript frameworks like React, Vue.js, and Vite were also discovered. These packages deploy destructive payloads once installed and have been downloaded over 6,200 times. Socket security researcher Kush Pandya highlighted that these packages go undetected by posing as legitimate plugins, only to corrupt data, delete critical files, or crash systems once executed. Some of them target specific JavaScript frameworks, manipulating their core functions or tampering with browser storage mechanisms.

Moreover, the abuse of open-source repositories has extended to Microsoft’s Visual Studio Code (VS Code) Marketplace, where malicious extensions have been identified targeting Solidity developers. These extensions, such as solaibot, among-eth, and blankebesxstnion, disguise harmful code within genuine features and steal cryptocurrency wallet credentials from victim Windows systems. The threat actor behind these malicious extensions, identified as MUT-9332, also utilizes complex infection chains and obfuscated malware to evade detection and continue their malicious activities.

The discovery of these malicious npm packages and VS Code extensions underscores the importance of vigilance in the cybersecurity landscape. Threat actors are constantly evolving their tactics to evade detection and compromise systems, highlighting the need for robust security measures and awareness among developers and users alike. Stay informed about the latest cybersecurity threats and follow reputable sources for updates on emerging risks in the digital ecosystem.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Senior RMF/ISSO Cybersecurity Engineer

College Student Admits to Hacking PowerSchool in Guilty Plea


A college student has come forward, ready to plead guilty to charges related to hacking into the PowerSchool system. This unexpected turn of events has shed light on the vulnerabilities within educational technology systems and raised questions about cybersecurity measures in schools. The student’s actions have sparked a conversation on the importance of safeguarding sensitive information and have prompted educational institutions to re-evaluate their digital defenses.

The case has captured attention due to the implications of such a breach, not only for the students and teachers directly affected but also for the broader educational community. Hacking incidents like these underscore the urgent need for robust cybersecurity protocols to protect against unauthorized access and data breaches, which can have wide-reaching consequences.

As the legal proceedings unfold, the public is keenly observing how this case will influence future cybersecurity policies in educational settings. Institutions are likely to scrutinize their current systems and implement more stringent security measures to prevent similar incidents. The focus is on creating a safe digital environment for students and staff, ensuring that sensitive information remains protected.

This incident also highlights the importance of educating students about ethical behavior in the digital realm. As technology becomes increasingly integrated into everyday life, understanding the ethical implications of digital actions is crucial. Schools may consider incorporating cybersecurity and ethics into their curricula to better prepare students for the digital world.

In light of this breach, there is a growing awareness of the need for collaboration between educational institutions and cybersecurity experts. By working together, they can develop strategies to enhance security measures and protect against future threats, ensuring that educational environments remain safe and secure.

Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Careers

Director of Cybersecurity Architecture

January 19, 20260
Careers

Senior Consultant- Cybersecurity

January 19, 20260
Careers

Industrial Cybersecurity

January 19, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Intern
  • Lead Cybersecurity Assessor
  • Cybersecurity Engineer
  • Director of Cybersecurity Architecture
  • Senior Consultant- Cybersecurity

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures