Tuesday, March 25, 2025
Homecyber securityHackers Compromise Windows Systems Using 5000+ Malicious Packages

Hackers Compromise Windows Systems Using 5000+ Malicious Packages

Published on

SIEM as a Service

Follow Us on Google News

A recent analysis by FortiGuard Labs has revealed a significant increase in malicious software packages, with over 5,000 identified since November 2024.

These packages employ sophisticated techniques to evade detection and exploit system vulnerabilities, posing a substantial threat to Windows systems and other software environments.

The tactics used by attackers include low-file-count packages, suspicious install scripts, and the absence of repository URLs, which together make it challenging for traditional security measures to detect these threats.

Windows Systems
Low file count for the NPM package xeno.dll v1.0.2

Malicious Software Packages on the Rise

The low-file-count packages, totaling 1,082, often contain minimal code designed to execute harmful actions undetected.

Windows Systems
Low file count for the PyPI package AffineQuant v99.6

These packages may use command overwrites, obfuscation techniques like base64 encoding, and suspicious behavior flagged by machine learning systems.

Additionally, 1,052 packages embed suspicious install scripts that silently deploy malicious code during installation, bypassing security checks.

According to FortiGuard Labs Report, these scripts can modify the standard installation process to execute harmful actions without the user’s knowledge, such as data exfiltration via HTTP POST requests or suspicious API calls.

Emerging Threats and Attack Cases

Among the highlighted attack cases, malicious Python packages like AffineQuant-99.6 and amzn-aws-glue-ml-libs-python-6.1.5 exploit setup files to collect system information, including MAC addresses and hostnames, and send this data to remote servers controlled by attackers.

These attacks underscore the risk developers face when installing packages from untrusted sources, potentially leading to stolen credentials and further attacks.

Another notable case involves a malicious Node.js script that secretly collects sensitive information from a victim’s machine and sends it to an external server via a Discord webhook.

This script retrieves internal and external IP addresses, system details, and user information, making it highly invasive and enabling attackers to track the victim’s machine for further exploitation.

To protect against these emerging threats, it is crucial for organizations and individuals to stay informed about the latest threats and implement proactive defense measures.

This includes regular system updates, advanced threat detection tools, and user education on identifying suspicious activity.

Fortinet’s FortiGuard AntiVirus service detects and protects against these malicious files, while the FortiDevSec SCA scanner identifies and prevents malicious dependencies from being introduced into projects.

By adopting robust security strategies, users can mitigate the risks associated with these malicious packages and safeguard their systems from potential attacks.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems

Researchers have introduced ARACNE, a fully autonomous Large Language Model (LLM)-based pentesting agent designed...

IDT Corporation Partners with AccuKnox for Zero Trust Runtime IoT/Edge Security

Menlo Park, United States, March 25th, 2025, CyberNewsWireFinTech and Communications Leader, IDT Corporation partners with AccuKnox to deploy...

New Phishing Campaign Targets Mac Users to Steal Login Credentials

A sophisticated phishing campaign, recently identified by LayerX Labs, has shifted its focus from...

CAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox Environment

CAPE, derived from Cuckoo v1, is a sophisticated malware sandbox designed to execute malicious...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems

Researchers have introduced ARACNE, a fully autonomous Large Language Model (LLM)-based pentesting agent designed...

New Phishing Campaign Targets Mac Users to Steal Login Credentials

A sophisticated phishing campaign, recently identified by LayerX Labs, has shifted its focus from...

CAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox Environment

CAPE, derived from Cuckoo v1, is a sophisticated malware sandbox designed to execute malicious...