Close Menu
globalcrimedesk.comglobalcrimedesk.com
    What's Hot

    Drunk driver who killed 2 when she crashed into birthday party at boat yard will head to prison for at least 25 years

    US Supreme Court grills Trump administration over birthright citizenship | Donald Trump News

    An authentic Magna Carta has been discovered in Harvard’s archives : NPR

    Facebook X (Twitter) Instagram
    Trending
    • Drunk driver who killed 2 when she crashed into birthday party at boat yard will head to prison for at least 25 years
    • US Supreme Court grills Trump administration over birthright citizenship | Donald Trump News
    • An authentic Magna Carta has been discovered in Harvard’s archives : NPR
    • PM’s Albania trip shows tricky path on migration
    • Rising Food Prices Deepen Nigeria’s Poverty Crisis
    • Lawyers for US Mayor Ras Baraka argue he was targeted for arrest at protest | Donald Trump News
    • ‘Gore is back, baby!’ Directors of ‘Final Destination’ are pushing bloody boundaries : NPR
    • Israeli strikes across Gaza kill 114, hospitals and rescuers say
    Facebook X (Twitter) Instagram
    globalcrimedesk.comglobalcrimedesk.com
    • Home
    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention
    • Scandals
    • Terror
    • Trafficking
    globalcrimedesk.comglobalcrimedesk.com
    Home»Cyber»Malicious NPM package uses Unicode steganography to evade detection
    Cyber

    Malicious NPM package uses Unicode steganography to evade detection

    mediamillion1000@gmail.comBy [email protected]May 15, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
    Follow Us
    Google News Flipboard
    Malicious NPM package uses Unicode steganography to evade detection
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Malicious NPM package uses Unicode steganography to evade detection

    A malicious package in the Node Package Manager index uses invisible Unicode characters to hide malicious code and Google Calendar links to host the URL for the command-and-control location.

    The package, named os-info-checker-es6, appears as an information utility and has been downloaded more than 1,000 times since the beginning of the month.

    Researchers at Veracode, a code security assessment company, found that the first version of the package was added to the Node Package Manager (NPM) index on March 19 and was benign, as it only collected operating system information from the host.

    The author added modifications a few days later to include platform-specific binaries and obfuscated install scripts.

    On May 7, a new version of the package was published, which featured code for “a sophisticated C2 (command-and-control) mechanism” that delivers the final payload.

    The latest version of ‘os-info-checker-es6’ available on npm at the time of writing is v1.0.8 and it is malicious, Veracode warns.

    Furthermore, the package is listed as a dependency for four other NPM packages: skip-tot, vue-dev-serverr, vue-dummyy, and ‘vue-bit – all pose as accessibility and developer platform engineering tools.

    It is unclear if or how these packages are promoted by the threat actor.

    Unicode steganography

    In the malicious version, the attacker embedded data in what appeared to be a ‘|’ string. However, the vertical bar is followed by a long sequence of invisible Unicode characters from the Variation Selectors Supplement range (U+E0100 to U+E01EF).

    These Unicode characters are normally modifiers, typically used “to provide specific glyph variations in complex scripts.” In this case, their role is to facilitate text-based steganography – hiding information in other data.

    Veracode decoded and deobfuscated the string to find a payload for a sophisticated C2 mechanism that relied on a Google Calendar short link to reach the location hosting the final payload.

    The researcher explain that after fetching the Google Calendar link, a set of redirects are checked until it receives a HTTP 200 OK response for the request.

    It then scrapes a data-base-title attribute from the event’s HTML page, which holds a base64-encoded URL pointing to the final payload.

    Using a function called ymmogvj, the URL is decoded to get a malware payload. The researchers say that the request expects a base- encoded stage-2 malware payload in the response body, and likely an initialization vector and a secret key in the HTTP headers – an indication of possible encryption of the final payload.

    Veracode also found that the payload is also executed using eval(). The script includes a simple persistence mechanism in the system’s temporary directory, which prevents multiple instances running at the same time.

    At the time of analysis, the researchers could not retrieve the final payload, suggesting that the campaign could be on hold or still in an early stage.

    Despite Veracode reporting its findings to NPM, the suspicious packages are still present on the platform.

    Red Report 2025

    Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

    detection evade malicious NPM Package steganography Unicode
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Previous ArticleBirthright citizenship in court; Trump’s ‘big’ bill : NPR
    Next Article Black security manager called ‘slave’ by white colleague in London awarded £361,000 | Race
    [email protected]
    • Website

    Related Posts

    US officials targeted in voice deepfake attacks since April

    May 15, 2025

    Cybercrims attacking UK retailers turn to US stores • The Register

    May 15, 2025

    Alternatives to Microsoft Outlook webmail come under attack in Europe

    May 15, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Posts

    Drunk driver who killed 2 when she crashed into birthday party at boat yard will head to prison for at least 25 years

    US Supreme Court grills Trump administration over birthright citizenship | Donald Trump News

    An authentic Magna Carta has been discovered in Harvard’s archives : NPR

    PM’s Albania trip shows tricky path on migration

    Trending Posts

    Drunk driver who killed 2 when she crashed into birthday party at boat yard will head to prison for at least 25 years

    May 15, 2025

    US Supreme Court grills Trump administration over birthright citizenship | Donald Trump News

    May 15, 2025

    An authentic Magna Carta has been discovered in Harvard’s archives : NPR

    May 15, 2025

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    News

    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention

    Company

    • About Us
    • Disclaimer
    • Get In Touch
    • Privacy policy
    • Terms & Condition
    Recent Posts
    • Drunk driver who killed 2 when she crashed into birthday party at boat yard will head to prison for at least 25 years
    • US Supreme Court grills Trump administration over birthright citizenship | Donald Trump News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 globalcrimedesk. Designed by Pro.
    Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

    Type above and press Enter to search. Press Esc to cancel.