κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks
άμυνα
.

Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks

18/08/2025

Cybersecurity researchers have discovered a malicious package in the Python Package Index (PyPI) repository that introduces malicious behavior through a dependency that allows it to establish persistence and achieve code execution.
The package, named termncolor, realizes its nefarious functionality through a dependency package called colorinal by means of a multi-stage malware operation, Zscaler ThreatLabz said. While termncolor was downloaded 355 times, colorinal attracted 529 downloads. Both libraries are no longer available on PyPI.
“This attack could leverage DLL side-loading to facilitate decryption, establish persistence, and conduct command-and-control (C2) communication, ending in remote code execution,” according to researchers Manisha Ramcharan Prajapati and Satyam Singh.
Once installed and executed, termncolor is designed to import colorinal, which, in turn, loads a rogue DLL that’s responsible for decrypting and running the next-stage payload.
Specifically, the payload deploys a legitimate binary “vcpktsvr.exe” and a DLL called “libcef.dll” that’s launched using DLL side-loading. The DLL, for its part, is capable of harvesting system information and communicating with the C2 server using Zulip, an open-source chat application, to conceal the activity.
“Persistence is achieved by creating a registry entry under the Windows Run key to ensure automatic execution of the malware at system startup,” Zscaler said.
The malware is also capable of infecting Linux systems, with the Python libraries dropping a shared object file called “terminate.so” to unleash the same functionality.

Further analysis of the threat actor’s Zulip activity has revealed three active users within the created organization, with a total of 90,692 messages exchanged within the platform. It’s believed that the malware author has been active since July 10, 2025.
“The termncolor package and its malicious dependency colorinal highlight the importance of monitoring open-source ecosystems for potential supply chain attacks,” the company said.
The disclosure comes as SlowMist revealed that threat actors are targeting developers under the guise of a job assessment to trick them into cloning a GitHub repository containing a booby-trapped npm package that’s capable of harvesting iCloud Keychain, web browser, and cryptocurrency wallet data, and exfiltrating the details to an external server.

The npm packages are also engineered to download and run Python scripts, capture system information, scan the file system for sensitive files, steal credentials, log keystrokes, take screenshots, and monitor clipboard content.
The list of identified packages, now removed from npm, is below –

  • redux-ace (163 Downloads)
  • rtk-logger (394 Downloads)

In recent months, malicious npm packages have been spotted targeting the cybersecurity community to facilitate data theft and cryptocurrency mining through a dependent package, using legitimate services like Dropbox to exfiltrate the information from infected systems.
These packages, Datadog researchers Christophe Tafani-Dereeper and Matt Muir noted, are distributed to targets under the guise of malicious proof-of-concept (PoC) code for security flaws, or a kernel patch that supposedly offers performance improvements. The activity has been attributed to a threat actor it tracks as MUT-1244.

The development also follows a report from ReversingLabs that has revealed the risks associated with automated dependency upgrades, particularly when a compromised project is used by thousands of other projects, amplifying risks to the software supply chain.

This is exemplified by the recent compromise of the eslint-config-prettier npm package by means of a phishing attack that allowed unnamed attackers to push poisoned versions directly to the npm registry without any source code commits or pull requests on its corresponding GitHub repository.
The software supply chain security company found that more than 14,000 packages have declared eslint-config-prettier as a direct dependency, instead of declaring it as a devDependency, causing automated actions like GitHub Actions to automatically merge the dependency update alerts issued by Dependabot without scrutinizing them.

“Since this is a configuration for a development tool used for code formatting, it can be expected that it should be declared as a devDependency across packages in which it is used, and, as such, it shouldn’t be automatically installed when the npm install command is executed like with regular dependencies,” security researcher Karlo Zanki said.
“Automated version management tools like Dependabot are designed to remove the risk of having dependencies with security issues in your code base, but […] ironically they can end up introducing even bigger security issues like malicious compromise.”
Source: thehackernews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-2

New WireTap Attack Break Server SGX To Exfiltrate Sensitive Data

A newly disclosed vulnerability, named the WireTap attack, allows attackers with physical access to break the security of Intel’s Software Guard eXtensions (SGX) on modern server processors and steal sensitive information. A research paper released in October 2025 details how this method can extract cryptographic keys from supposedly secure SGX enclaves using a low-cost setup, challenging the … [Read More...]

Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code

Unity Technologies has issued a critical security advisory warning developers about a high-severity vulnerability affecting its widely used game development platform.  The flaw, designated CVE-2025-59489, exposes applications built with vulnerable Unity Editor versions to unsafe file loading attacks that could enable local code execution and privilege escalation across multiple operating … [Read More...]

Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users

Microsoft has announced a significant security enhancement for Outlook users, implementing the retirement of inline SVG image support across Outlook for Web and the new Outlook for Windows platforms.  This change represents a proactive measure to strengthen email security infrastructure and protect users from potential cybersecurity threats. The rollout timeline has been strategically … [Read More...]

5 tips for setting up guest Wi-Fi that isn't a danger to your home

Having guests over is great until they ask for the Wi-Fi password. I'm then faced with the awkward dance of finding that crumpled sticky note, dictating a convoluted string of alphanumeric characters, and hoping they type it in correctly. But the real problem is how guests feel like I'm inviting a security nightmare home. Digitally, handing out my main Wi-Fi password is like giving a stranger a … [Read More...]

Acer Chromebook Plus Spin 514 review: a versatile, convertible powerhouse

A good Chromebook can sometimes be hard to find. Many ChromeOS devices are too underpowered to really do much beyond browse the web and manage your email, or they suffer from poor build quality, dim displays, or uncomfortable keyboards. But that's not the case with the new Acer Chromebook Plus Spin 514. Source: xda-developers.com … [Read More...]

Wolverine: 4 Marvel characters we'd love to see meet up with Logan

During the State of Play presentation for September 2025, Insomniac Game finally gave everyone an official first look at their upcoming Wolverine game. What was very clear from the start was that this would be different from what fans have come to expect from the studio, given their Spider-Man titles were wildly successful. For many people who love Marvel Comics, Wolverine is a character that … [Read More...]

Using my NAS as an Apple Time Machine backup store was the best QoL upgrade for my MacBook

Creating regular backups of your essential files goes a long way in ensuring your devices remain in tip-top form, regardless of whether you’re a casual user or a hardcore tinkering veteran with multiple projects under your belt. While there are certain self-hosted services that can accomplish this task on Windows and Linux, the macOS ecosystem is blessed with a dedicated snapshot utility called … [Read More...]

3 Windows File Explorer add-ons that fix Microsoft's biggest pain points

File Explorer is one of the oldest parts of Windows, and you can tell. Microsoft has added tabs and refreshed the icons, but the core experience still needs work. For example, the layout looks rigid, and everyday actions like batch renaming need third-party help to be more complete. File Explorer also feels flat to look at, with almost no way to change its appearance. Small pain points like these … [Read More...]

The single Docker container that made me a home lab power user

For years, I treated my home lab like a necessary chore – a collection of services running on command line interfaces that required constant SSH logins just to check logs or reboot a container. I knew the power of Docker, but managing multiple environments across different hardware was often a confusing, time-consuming mess. Source: xda-developers.com … [Read More...]

Kingmakers, the medieval battle game with modern weapons, has been delayed

Redemption Road's absolutely bonkers-looking medieval shooter, Kingmakers, was slated to launch in Early Access on October 8, but now its release has been pushed back with no new date in sight. The developers posted an update on Steam to say that the scheduled launch, just days away, "will no longer be possible," going on to explain that they need "a bit more time on content polish before we feel … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • New WireTap Attack Break Server SGX To Exfiltrate Sensitive Data
  • Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code
  • Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users
  • 5 tips for setting up guest Wi-Fi that isn't a danger to your home
  • Acer Chromebook Plus Spin 514 review: a versatile, convertible powerhouse

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023