Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT

The Hacker News by The Hacker News
January 2, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Cybersecurity researchers have discovered a malicious package on the npm package registry that masquerades as a library for detecting vulnerabilities in Ethereum smart contracts but, in reality, drops an open-source remote access trojan called Quasar RAT onto developer systems.

The heavily obfuscated package, named ethereumvulncontracthandler, was published to npm on December 18, 2024, by a user named “solidit-dev-416.” As of writing, it continues to be available for download. It has been downloaded 66 times to date.

“Upon installation, it retrieves a malicious script from a remote server, executing it silently to deploy the RAT on Windows systems,” Socket security researcher Kirill Boychenko said in an analysis published last month.

The malicious code embedded into ethereumvulncontracthandler is obscured with multiple layers of obfuscation, leveraging techniques like Base64- and XOR-encoding, as well as minification to resist analysis and detection efforts.

The malware also performs checks to avoid running in sandboxed environments, prior to acting as a loader by fetching and executing a second-stage payload from a remote server (“jujuju[.]lat”). The script is designed to run PowerShell commands to initiate the execution of Quasar RAT.

Cybersecurity

The remote access trojan, for its part, establishes persistence through Windows Registry modifications and contacts a command-and-control (C2) server (“captchacdn[.]com:7000”) to receive further instructions that allow it to gather and exfiltrate information.

Quasar RAT, first publicly released on GitHub in July 2014, has been used for both cybercrime and cyber espionage campaigns by various threat actors over the years.

“The threat actor also uses this C2 server to catalog infected machines, and manage multiple compromised hosts simultaneously if this campaign is part of a botnet infection,” Boychenko said.

“At this stage, the victim’s machine is fully compromised, and is under complete surveillance and control by the threat actor, ready for regular check-ins and to receive updated instructions.”

The Ballooning Problem of Fake Stars on GitHub

The disclosure comes as a new study undertaken by Socket, alongside academics from Carnegie Mellon University and North Carolina State University has revealed a rapid surge in inauthentic “stars” that are used to artificially inflate the popularity of malware-laced GitHub repositories.

While the phenomenon has been around for some time, the research discovered that the majority of fake stars are used to promote short-lived malware repositories masquerading as pirating software, game cheats, and cryptocurrency bots.

Advertised via GitHub star merchants like Baddhi Shop, BuyGitHub, FollowDeh, R for Rank, and Twidium, the “open” black market is suspected to be behind as many 4.5 million “fake” stars from 1.32 million accounts and spanning 22,915 repositories, illustrating the scale of the problem.

Baddhi Shop, The Hacker News found, lets prospective customers buy 1,000 GitHub stars for $110. “Buy GitHub Followers, Stars, Forks, and Watchers to boost your repository’s credibility and visibility,” a description on the site reads. “Real engagement attracts more developers and contributors to your project!”

“Only a few repositories with fake star campaigns are published in package registries such as npm and PyPI,” the researchers said. “Even fewer are widely adopted. At least 60% of the accounts that participated in fake star campaigns have trivial activity patterns.”

As the open-source software supply chain continues to be an attractive vector for cyber attacks, the findings reiterate that star count alone is an unreliable signal of quality or reputation and should not be used without further review.

Cybersecurity

In a statement shared with WIRED in October 2023, the Microsoft-owned code hosting platform said it’s been aware of the problem for years and that it actively works to remove fake starrers from the service.

“The main vulnerability of star count as a metric lies in the fact that the actions of all GitHub users share equal weight in its definition,” the researchers said.

“As a result, star count can be easily inflated with a high volume of bot accounts or (arguably low reputation) crowdsourced humans, as we have shown in our study. To avoid such exploitation, GitHub may consider presenting a weighted metric to signal repository popularity (e.g., based on dimensions of network centrality), which is considerably harder to fake.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
KuCoin Launches KuCoin Pay, a Merchant Solution Leading the Future of Crypto Payments

KuCoin Launches KuCoin Pay, a Merchant Solution Leading the Future of Crypto Payments

Recommended.

Ribbon Communications to Report First Quarter 2025 Financial Results on April 29, 2025

Ribbon Communications to Report First Quarter 2025 Financial Results on April 29, 2025

April 17, 2025
reVolver Podcasts and AmericaTV Partner to Launch Peruvian Hits on Global Audio Stage

reVolver Podcasts and AmericaTV Partner to Launch Peruvian Hits on Global Audio Stage

April 17, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio