Tuesday, April 22, 2025
HomeCyber Security NewsHackers Weaponize Security Testing By Weaponizing npm, PyPI, & Ruby Exploit Packages

Hackers Weaponize Security Testing By Weaponizing npm, PyPI, & Ruby Exploit Packages

Published on

SIEM as a Service

Follow Us on Google News

Over the past year, malicious actors have been abusing OAST services for data exfiltration, C2 channel establishment, and multi-stage attacks by leveraging compromised JavaScript, Python, and Ruby packages.

OAST tools, initially designed for ethical researchers to perform network interactions, can also be exploited by threat actors for malicious purposes such as data exfiltration and pivot point identification.

A high-versioned npm package (adobe-dcapi-web) masquerades as an Adobe API to steal data, which uses obfuscated JavaScript to bypass geolocation checks and exfiltrate data to oastify.com upon reaching a non-Russian environment.

- Advertisement - Google News
flagged adobe-dcapi-web package as malicious

For the purpose of determining the user’s location, the code retrieves the public IP address and transmits a query to an external service (ipwhois.app). 

If the location is detected as Russia (country_code “RU”), the code terminates the process to prevent the malware from executing in that region.

This technique is employed by threat actors to evade detection or limit the impact of their attacks in specific countries.

It identifies the operating system and checks for specific processes associated with VirtualBox and VMware to detect virtualized environments often used by threat actors in Russia to evade detection and analysis.

The malicious script harvests user and system information along with the public IP address on both Linux/macOS and Windows systems, then exfiltrates the data to the oastify.com endpoint and removes temporary files to cover its tracks.

Actor “drv0s” typosquatted the legitimate package “monolith” with “monoliht” on PyPI to steal victim’s hostname, username, and current working directory through malicious domains.

contextual details about the malicious package

It collects system information such as hostname, username, and current working directory, sending the data to hardcoded URLs for exfiltration. This tactic helps attackers maintain persistence by distributing exfiltration across multiple domains.

Malicious RubyGems named chauuuyhhn, nosvemosssadfsd, and holaaaaaafasdf exfiltrate sensitive information through DNS requests to an attacker-controlled domain, oastify.com, bypassing basic intrusion detection systems.

The malicious script retrieves the victim’s external IP address and system information like hostname, username, working directory, and folder name.

It then constructs a DNS query containing this information and sends it to the attacker’s server, which is likely used for initial reconnaissance to gather information about potential targets for later attacks.

According to Socket, by providing developers and security engineers with the ability to proactively find and fix vulnerabilities, OAST provides extremely valuable security benefits. 

Threat actors are exploiting OAST techniques to stealthily identify, exploit, and maintain access to vulnerable systems.

Ongoing efforts are crucial to leverage the benefits of OAST for defensive purposes while mitigating the risks of its misuse by attackers.

ANY.RUN Threat Intelligence Lookup - Extract Millions of IOC's for Interactive Malware Analysis: Try for Free

Indicators of Compromise (IOCs):

Malicious npm Package:

  • adobe-dcapi-web

Malicious PyPI Package:

  • monoliht

Malicious RubyGems Packages:

  • chauuuyhhn
  • nosvemosssadfsd
  • holaaaaaafasdf

Malicious OAST Endpoints:

  • gbv6crrcecvsm77b41bxoih8wz2rqie7.oastify[.]com
  • sbfwstspuutiarcjzptfenn9u0dsxhjlu.oast[.]fun
  • dnipqouebm-psl.cn.oast-cn.byted-dast[.]com
  • oqvignkp58-psl.i18n.oast-row.byted-dast[.]com
  • kc0262r8oypagq3e8f89uaqmodu4i16q.oastify[.]com
Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...