Category: Uncategorized

  • 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials

    27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials


    Cybersecurity researchers have disclosed details of what has been described as a “sustained and targeted” spear-phishing campaign that has published over two dozen packages to the npm registry to facilitate credential theft.

    The activity, which involved uploading 27 npm packages from six different npm aliases, has primarily targeted sales and commercial personnel at critical infrastructure-adjacent organizations in the U.S. and Allied nations, according to Socket.

    “A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft,” researchers Nicholas Anderson and Kirill Boychenko said.

    The names of the packages are listed below –

    • adril7123
    • ardril712
    • arrdril712
    • androidvoues
    • assetslush
    • axerification
    • erification
    • erificatsion
    • errification
    • eruification
    • hgfiuythdjfhgff
    • homiersla
    • houimlogs22
    • iuythdjfghgff
    • iuythdjfhgff
    • iuythdjfhgffdf
    • iuythdjfhgffs
    • iuythdjfhgffyg
    • jwoiesk11
    • modules9382
    • onedrive-verification
    • sarrdril712
    • scriptstierium11
    • secure-docs-app
    • sync365
    • ttetrification
    • vampuleerl

    Rather than requiring users to install the packages, the end goal of the campaign is to repurpose npm and package content delivery networks (CDNs) as hosting infrastructure, using them to deliver client-side HTML and JavaScript lures impersonating secure document-sharing that are embedded directly in phishing pages, following which victims are redirected to Microsoft sign-in pages with the email address pre-filled in the form.

    Cybersecurity

    The use of package CDNs offers several benefits, the foremost being the ability to turn a legitimate distribution service into infrastructure that’s resilient to takedowns. In addition, it makes it easy for attackers to switch to other publisher aliases and package names, even if the libraries are pulled.

    The packages have been found to incorporate various checks on the client side to challenge analysis efforts, including filtering out bots, evading sandboxes, and requiring mouse or touch input before taking the victims to threat-actor-controlled credential harvesting infrastructure. The JavaScript code is also obfuscated or heavily minified to make automated inspection more difficult.

    Another crucial anti-analysis control adopted by the threat actor relates to the use of honeypot form fields that are hidden from view for real users, but are likely to be populated by crawlers. This step acts as a second layer of defense, preventing the attack from proceeding further.

    Socket said the domains packed into these packages overlap with adversary-in-the-middle (AitM) phishing infrastructure associated with Evilginx, an open-source phishing kit.

    This is not the first time npm has been transformed into phishing infrastructure. Back in October 2025, the software supply chain security firm detailed a campaign dubbed Beamglea that saw unknown threat actors uploading 175 malicious packages for credential harvesting attacks. The latest attack wave is assessed to be distinct from Beamglea.

    “This campaign follows the same core playbook, but with different delivery mechanics,” Socket said. “Instead of shipping minimal redirect scripts, these packages deliver a self-contained, browser-executed phishing flow as an embedded HTML and JavaScript bundle that runs when loaded in a page context.”

    What’s more, the phishing packages have been found to hard-code 25 email addresses tied to specific individuals, who work in account managers, sales, and business development representatives in manufacturing, industrial automation, plastics and polymer supply chains, healthcare sectors in Austria, Belgium, Canada, France, Germany, Italy, Portugal, Spain, Sweden, Taiwan, Turkey, the U.K., and the U.S.

    It’s currently unknown how the attackers obtained the email addresses. But given that many of the targeted firms convene at major international trade shows, such as Interpack and K-Fair, it’s suspected that the threat actors may have pulled the information from these sites and combined it with general open-web reconnaissance.

    Cybersecurity

    “In several cases, target locations differ from corporate headquarters, which is consistent with the threat actor’s focus on regional sales staff, country managers, and local commercial teams rather than only corporate IT,” the company said.

    To counter the risk posed by the threat, it’s essential to enforce stringent dependency verification, log unusual CDN requests from non-development contexts, enforce phishing-resistant multi-factor authentication (MFA), and monitor for suspicious post-authentication events.

    The development comes as Socket said it observed a steady rise in destructive malware across npm, PyPI, NuGet Gallery, and Go module indexes using techniques like delayed execution and remotely-controlled kill switches to evade early detection and fetch executable code at runtime using standard tools such as wget and curl.

    “Rather than encrypting disks or indiscriminately destroying files, these packages tend to operate surgically,” researcher Kush Pandya said.

    “They delete only what matters to developers: Git repositories, source directories, configuration files, and CI build outputs. They often blend this logic into otherwise functional code paths and rely on standard lifecycle hooks to execute, meaning the malware may never need to be explicitly imported or invoked by the application itself.”



    Source link

  • Spanish woman who found fame for botching fresco restoration dies

    Spanish woman who found fame for botching fresco restoration dies


    The Spanish parishioner who made headlines around the world for her botched restoration of a prized Jesus Christ fresco has died aged 94.

    Cecilia Giménez, an elderly woman from Borja, northeast Spain, became famous 13 years ago after she attempted to restore the century-old painting titled Ecce Homo that was held in her local church.

    Giménez’s restoration went viral and earned the nickname “Monkey Christ”, because of Christ’s head resembling a hairy monkey.

    The 94-year-old’s death was confirmed by Borja’s major, Eduardo Arilla, in a Facebook post, in which he recognised her as a “great lover of painting from a young age”.

    Arilla paid tribute to Giménez’s “famous restoration of Ecce Homo” in August 2012, which “due to the poor state of conservation it presented, Cecilia, with the best intentions, decided to repaint the work over”.

    The Ecce Homo (“Behold the Man” in Latin) by 19th century painter Elias Garcia Martinez has been held for more than 100 years in the Sanctuary of Mercy Church near Zaragoza.

    In 2012, Giménez, then 81, told BBC News that church members had “always repaired everything here”, and that she had permission from the local priest to do so.

    Giménez said at the time anybody who entered the Church would have seen she was painting over the original.

    The impact of the restoration led to the “Monkey Christ” meme and saw the once quiet town of Borja quickly become a tourist destination.

    The town, which had previously welcomed just 5,000 visitors per year, received more than 40,000 tourists by 2013, and raised more than €50,000 for charity at the time.

    Today, officials say that between 15,000 and 20,000 tourists per year visit Borja to see the famous portrait, which is now behind a protective shield of glass.

    After recovering from the backlash, with support from local residents and others around the world, Giménez went on to stage an art exhibition with 28 of her own paintings.

    She was praised by Borja’s major for her generosity and years of dedication to the church.

    “Rest in peace Cecilia, we will always remember you,” Arilla wrote on Facebook.



    Source link

  • Bangladesh’s first female prime minister Khaleda Zia dies aged 80

    Bangladesh’s first female prime minister Khaleda Zia dies aged 80


    Bangladesh’s first female prime minister Khaleda Zia has died at the age of 80 after suffering from a prolonged illness.

    “Our favourite leader is no longer with us. She left us at 6am this morning,” Zia’s Bangladesh Nationalist Party (BNP) announced on Facebook.

    Physicians had said on Monday night that Zia’s condition was “extremely critical”. She was put on life support, but it was not possible to provide multiple treatments at the same time given her age and overall poor health, they said.

    Zia became Bangladesh’s first female head of government in 1991 after leading the BNP to victory in the country’s first democratic election in 20 years.

    Zia returned to the post of prime minister in 2001, stepping down in October 2006 ahead of a general election.

    Her political career had been marred by corruption allegations and a long-standing political rivalry with Awami League leader Sheikh Hasina, who was ousted from premiership last year.

    Zia, who was the wife of Bangladesh’s late president Ziaur Rahman, was jailed for five years in 2018 for corruption.



    Source link