npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章的英文内容,我需要先理解文章的主要信息。 文章主要讲的是网络安全研究人员发现npm、Python和Ruby生态系统中存在多个恶意软件包,这些包利用Discord作为命令与控制(C2)通道来传输被盗数据到攻击者控制的webhook。Discord的webhook允许攻击者无需认证即可发送消息,这使得它们成为数据外泄的理想工具。 此外,文章还提到朝鲜威胁行为者通过Contagious Interview活动上传了338个恶意软件包,这些包被用来分发恶意软件,并且伪装成合法的开发工具或库。这些恶意软件包被下载了超过5万次,目标包括Web3、加密货币和区块链开发者以及技术领域的求职者。 用户希望总结控制在100字以内,并且不需要特定的开头。我需要提取关键点:恶意软件包利用Discord webhook作为C2通道,涉及多个生态系统;朝鲜行为者上传大量恶意包,伪装成合法库,目标特定开发者群体。 现在我需要将这些信息浓缩成一个简洁的句子,确保不超过100字。 </think> 研究人员发现多个恶意软件包利用Discord webhook作为C2通道窃取数据。这些攻击涉及npm、Python和Ruby生态系统,并伪装成合法开发工具吸引特定开发者群体。 2025-10-14 07:9:0 Author: thehackernews.com(查看原文) 阅读量:67 收藏

Cybersecurity researchers have identified several malicious packages across npm, Python, and Ruby ecosystems that leverage Discord as a command-and-control (C2) channel to transmit stolen data to actor-controlled webhooks.

Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for attackers to exfiltrate data to a channel under their control.

"Importantly, webhook URLs are effectively write-only," Socket researcher Olivia Brown said in an analysis. "They do not expose channel history, and defenders cannot read back prior posts just by knowing the URL."

DFIR Retainer Services

The software supply chain security company said it identified a number of packages that use Discord webhooks in various ways -

  • mysql-dumpdiscord (npm), which siphons the contents of developer configuration files like config.json, .env, ayarlar.js, and ayarlar.json to a Discord webhook
  • nodejs.discord (npm), which uses a Discord webhook to likely log alerts (an approach that's not inherently malicious)
  • malinssx, malicus, and maliinn (PyPI), which uses Discord as a C2 server by triggering an HTTP request to a channel every time the packages are installed using "pip install <package name>"
  • sqlcommenter_rails (RubyGems.org), which collects host information, including contents of sensitive files like "/etc/passwd" and "/etc/resolv.conf," and sends it to a hard-coded Discord webhook

"Abuse of Discord webhooks as C2 matters because it flips the economics of supply chain attacks," Brown noted. "By being free and fast, threat actors avoid hosting and maintaining their own infrastructure. Also, they often blend in to regular code and firewall rules, allowing exfiltration even from secured victims."

"When paired with install-time hooks or build scripts, malicious packages with Discord C2 mechanism can quietly siphon .env files, API keys, and host details from developer machines and CI runners long before runtime monitoring ever sees the app."

Contagious Interview Floods npm With Fake Packages

The disclosure comes as the company also flagged 338 malicious packages published by North Korean threat actors associated with the Contagious Interview campaign, using them to deliver malware families like HexEval, XORIndex, and encrypted loaders that deliver BeaverTail, instead of directly dropping the JavaScript stealer and downloader. The packages were collectively downloaded more than 50,000 times.

"In this latest wave, North Korean threat actors used more than 180 fake personas tied to new npm aliases and registration emails, and ran over a dozen command and control (C2) endpoints," security researcher Kirill Boychenko said.

Targets of the campaign include Web3, cryptocurrency, and blockchain developers, as well as job seekers in the technical sector, who are approached on professional platforms like LinkedIn with lucrative opportunities. Prospective targets are then instructed to complete a coding assignment by cloning a booby-trapped repository that references a malicious package (e.g., eslint-detector) that's already published to the npm registry.

CIS Build Kits

Once run locally on the machine, the package referenced in the supposed project acts as a stealer (i.e., BeaverTail) to harvest browser credentials, cryptocurrency wallet data, macOS Keychain, keystrokes, clipboard content, and screenshots. The malware is designed to download additional payloads, including a cross-platform Python backdoor codenamed InvisibleFerret.

Of the hundreds of packages uploaded by North Korean actors, many of them are typosquats of their legitimate counterparts (e.g., dotevn vs. dotenv), especially those related to Node.js, Express, or frontend frameworks like React. Some of the identified libraries have also been found to be lookalikes of Web3 kits (e.g., ethrs.js vs. ethers.js).

"Contagious Interview is not a cybercrime hobby, it operates like an assembly line or a factory-model supply chain threat," Boychenko said. "It is a state-directed, quota-driven operation with durable resourcing, not a weekend crew, and removing a malicious package is insufficient if the associated publisher account remains active."

"The campaign's trajectory points to a durable, factory-style operation that treats the npm ecosystem as a renewable initial access channel."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/10/npm-pypi-and-rubygems-packages-found.html
如有侵权请联系:admin#unsafe.sh