Dismiss this notice
ExpressVPN Valentines 2021 Giveaway - https://www.geeks.fyi/showthread.php?tid=14246

Dismiss this notice
Internet Download Manager Giveaway - https://www.geeks.fyi/showthread.php?tid=14245

Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Discord-Stealing Malware Invades npm Packages
Quote:Three malicious software packages have been published to npm, a code repository for JavaScript developers to share and reuse code blocks. The packages represent a supply-chain threat given that they may be used as building blocks in various web applications; any applications corrupted by the code can steal tokens and other information from Discord users, researchers said.
Discord is designed for creating communities on the web, called “servers,” either as standalone forums or as part of another website. Users communicate with voice calls, video calls, text messaging, media and files. Discord “bots” are central to its function; these are AIs that can be programmed to moderate discussion forums, welcome and guide new members, police rule-breakers and perform community outreach. They’re also used to add features to the server, such as music, games, polls, prizes and more.
Discord tokens are used inside bot code to send commands back and forth to the Discord API, which in turn controls bot actions. If a Discord token is stolen, it would allow an attacker to hack the server.
As of Friday, the packages (named an0n-chat-lib, discord-fix and sonatype, all published by “scp173-deleted”) were still available for download. They make use of brandjacking and typosquatting to lure developers into thinking they’re legitimate. There is also “clear evidence that the malware campaign was using a Discord bot to generate fake download counts for the packages to make them appear more popular to potential users,” according to researchers at Sonatype.
The authors are the same operators behind the CursedGrabber Discord malware,  the researchers said, and the packages share DNA with that threat.
The CursedGrabber Discord malware family, discovered in November, targets Windows hosts. It contains two .exe files which are invoked and executed via ‘postinstall’ scripts from the manifest file, ‘package.json’. One of the .exe files scans user profiles from multiple web browsers along with Discord leveldb files, steals Discord tokens, steals credit-card information, and sends user data via a webhook to the attacker. The second unpacks additional code with multiple capabilities, including privilege escalation, keylogging, taking screenshots, planting backdoors, accessing webcams and so on.
In the case of the three npm packages, these “contain variations of Discord token-stealing code from the Discord malware discovered by Sonatype on numerous occasions,” said Sonatype security researcher Ax Sharma, in a Friday blog posting.

Read more: https://threatpost.com/discord-stealing-...es/163265/
[-] The following 1 user Likes silversurfer's post:
  • harlan4096

Forum Jump:

Users browsing this thread: 1 Guest(s)
You have to register before you can post on our site.



Recent Posts
NoVirusThanks OSArmor v1.5.7
We've released a n...harlan4096 — 06:07
HTTPS Everywhere to use DuckDuckGo's Sma...
HTTPS Everywher...harlan4096 — 05:53
Attackers Target ProxyLogon Exploit to I...
Cryptojacking can ...silversurfer — 17:55
Gafgyt Botnet Lifts DDoS Tricks from Mir...
Several variants o...silversurfer — 17:54
Biden Races to Shore Up Power Grid Again...
President Biden is...silversurfer — 17:52

Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (40)wapedDow
avatar (44)oapedDow
avatar (37)Sanchowogy
avatar (39)techlignub
avatar (38)Stevenmam
avatar (45)onlinbah
avatar (46)steakelask
avatar (40)Termoplenka
avatar (38)bycoPaist
avatar (44)pieloKat
avatar (38)ilyagNeexy
avatar (46)donitascene
avatar (46)Toligo
avatar (33)RobertUtelt

Online Staff
There are no staff members currently online.