Cyber Security

Over 1200 NPM Packages Found Involved in “CuteBoi” Cryptomining Campaign

Researchers have disclosed a new large-scale cryptocurrency mining campaign targeting the NPM JavaScript package repository.

The malicious activity, attributed to a software supply chain threat actor dubbed CuteBoi, involves an array of 1,283 rogue modules that were published in an automated fashion from over 1,000 different user accounts.

“This was done using automation which includes the ability to pass the NPM 2FA challenge,” Israeli application security testing company Checkmarx said. “This cluster of packages seems to be a part of an attacker experimenting at this point.”

All the released packages in question are said to harbor near-identical source code from an already existing package named eazyminer that’s used to mine Monero by means of utilizing unused resources on web servers.

One notable modification entails the URL to which the mined cryptocurrency should be sent, although installing the rogue modules will not bring about a negative effect.

“The copied code from eazyminer includes a miner functionality intended to be triggered from within another program and not as a standalone tool,” researcher Aviad Gershon said. “The attacker didn’t change this feature of the code and for that reason, it won’t run upon installation.”

Like observed in the case of RED-LILI earlier this year, the packages are published via an automation technique that allows the threat actor to defeat two-factor authentication (2FA) protections.

However, while the former involved setting up a custom server and using a combination of tools like Selenium and Interactsh to programmatically create an NPM user account and defeat 2FA, CuteBoi relies on a disposable email service called mail.tm.

The free platform also offers a REST API, “enabling programs to open disposable mailboxes and read the received emails sent to them with a simple API call,” allowing the threat actor to circumvent the 2FA challenge when creating a user account.

The findings coincide with another NPM-related widespread software supply chain attack dubbed IconBurst that’s engineered to harvest sensitive data from forms embedded in downstream mobile applications and websites.

Articles You May Like

Moto G85 5G Surfaces on Geekbench Ahead of Debut, Could Be Equipped With Snapdragon 4 Gen 3 Chip
Redmi Note 13R With Snapdragon 4 Gen 2 SoC, 5,030mAh Battery Launched: Price, Specifications
Microsoft Plans to Bring More Xbox Games to PS5 As Part of ‘Latutude’ Plan: Report
OpenAI Partners Up With Reddit to Bring Its Content to ChatGPT and New AI Products
Vivo X100s, X100s Pro With MediaTek Dimensity 9300+ SoCs, 100W Fast Charging Launched: Price, Specifications