• Contact Us
  • Login
Upgrade
Tech News Hero
Advertisement
  • Home
  • News
  • Gadgets
  • Social
  • Gaming
  • Mobile
  • PC
  • Internet
  • Security
  • Apps
No Result
View All Result
  • Home
  • News
  • Gadgets
  • Social
  • Gaming
  • Mobile
  • PC
  • Internet
  • Security
  • Apps
No Result
View All Result
Tech News Hero
No Result
View All Result
Home Security

Microsoft spots malicious npm package stealing data from UNIX systems

by technewshero
January 14, 2020
in Security
0
Share on FacebookShare on Twitter



admin


January 14, 2020
Security


20 Views

npm

The security team at npm (Node Package Manager), the de-facto package manager for the JavaScript ecosystem, has taken down today a malicious package that was caught stealing sensitive information from UNIX systems.

The malicious package is named 1337qq-js and was uploaded on the npm repository on December 30, 2019.

The package was downloaded at least 32 times, before it was spotted and today by Microsoft’s Vulnerability Research team.

According to an analysis by the npm security team, the package exfiltrates sensitive information through install scripts and targets UNIX systems only.

The type of data it collects includes:

  • Environment variables
  • Running processes
  • /etc/hosts
  • uname -a
  • npmrc file

Stealing environment variables is considered a major security breach because some information such as hard-coded passwords or API access tokens are often stored as environment variables in some JavaScript web or mobile apps.

The npm team recommends that all developers who downloaded or used this JavaScript package in their projects remove the package from their systems and rotate any compromised credentials.

This marks the sixth incident of a malicious package making it on the npm repository index, although, this is the least severe, primarily because Microsoft security analysts caught the library two weeks after it was published and before it gained a serious following.

Previous incidents of malicious npm packages making it on npm include:

  • June 2019 – a hacker backedoored the electron-native-notify library to insert malicious code that reached the Agama cryptocurrency wallet.
  • November 2018 – a hacker backdoored the event-stream npm package to load malicious code inside the BitPay Copay desktop and mobile wallet apps, and steal cryptocurrency.
  • July 2018 – a hacker compromised the ESLint library with malicious code that was designed to steal the npm credentials of other developers.
  • May 2018 – a hacker tried to hide a backdoor in a popular npm package named getcookies.
  • April 2017 – a hacker used typosquatting to upload 38 malicious JavaScript libraries on npm, packages configured to steal environment details from the projects where they were being used.

Source link


2020-01-14


Check Also



Most of us are so used to the apps we rely on, it’s easy to …

Previous Post

Don’t expect the PS5 unveiling at E3 2020 – Sony confirms it’s not attending this year

Next Post

WhatsApp, Google, Apple Response Sought by Delhi High Court on Plea to Retain Data of JNU Violence

technewshero

technewshero

Related Posts

2020 Shows the Danger of a Decapitated Cyber Regime
Security

2020 Shows the Danger of a Decapitated Cyber Regime

by technewshero
January 13, 2021
A ‘Bulletproof’ Criminal VPN Was Taken Down in a Global Sting
Security

A ‘Bulletproof’ Criminal VPN Was Taken Down in a Global Sting

by technewshero
January 14, 2021
The Worst Hacks of 2020, a Surreal Pandemic Year
Security

The Worst Hacks of 2020, a Surreal Pandemic Year

by technewshero
January 15, 2021
Security

How Your Digital Trails Wind Up in the Police’s Hands

by technewshero
December 31, 2020
How to Understand the Russia Hack Fallout
Security

How to Understand the Russia Hack Fallout

by technewshero
December 22, 2020
Next Post

WhatsApp, Google, Apple Response Sought by Delhi High Court on Plea to Retain Data of JNU Violence

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Most Popular

Twitter Fleets Accessible Even After 24-Hour Expiration Period, Company Working on Fix: Report

Twitter Fleets Accessible Even After 24-Hour Expiration Period, Company Working on Fix: Report

December 13, 2020

Wikimedia Foundation expresses deep concerns about India’s proposed intermediary liability rules – TechNewHero

December 27, 2019
Startups making meat alternatives are gaining traction worldwide – TechNewHero

Startups making meat alternatives are gaining traction worldwide – TechNewHero

December 13, 2020

Browse by Category

  • Apps
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • News
  • PC & Laptops
  • Security
  • Social
Tech News Hero

© 2020 Tech News Hero.

No Result
View All Result
  • Home
  • Landing Page
  • Buy JNews
  • Support Forum
  • Contact Us

© 2020 Tech News Hero.

Welcome Back!

Login to your account below

Forgotten Password?

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?