Wednesday, April 9, 2025
HomeCyber AttackSkuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through malicious packages disguised as legitimate tools. The threat actor, “k303903,” compromised hundreds of machines before the packages were removed. 

Subsequent analysis revealed that “k303903” likely operates under the aliases “shegotit2” and “pressurized,” all exhibiting identical or highly similar tactics, techniques, and procedures (TTPs) to infiltrate the npm ecosystem with malware by demonstrating the persistent threat of supply chain attacks and the need for heightened security measures within the development ecosystem.

A malicious campaign targeting npm developers delivered the Skuld infostealer, marking the second such attack in two months, which closely resembles a previous attack on Roblox developers, demonstrating the attackers’ adaptability. 

- Advertisement - Google News
Skuld’s ability to steal passwords, cookies, sensitive files, and browsing history from Chromium and Gecko-based browsers.
Skuld’s ability to steal passwords, cookies, sensitive files, and browsing history from Chromium and Gecko-based browsers.

The threat actors employed typosquatting and obfuscation techniques to compromise development machines and exfiltrate sensitive data, which showcases a recurring pattern where attackers quickly adapt their strategies after initial success, reintroducing threats with new packaging and distribution methods. 

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

The December 2024 campaign leveraged common deployment methods and relied on commodity malware, highlighting the consistent use of deceptive tactics by these threat actors.

The code snippet reveals a malicious download and execution process by utilizing libraries like `fs-extra`, `path`, `node-fetch`, and `child_process` to download a malicious binary from a URL disguised to appear legitimate and then execute it. 

Obfuscator.io was used to obfuscate the code, making initial detection challenging. Once installed, the malware fetches and executes the payload (Skuld infostealer) under the filename download.exe.

contextual details about the malicious package.
contextual details about the malicious package.

Actor k303903 used typosquatting to upload malicious npm packages that resembled popular libraries, which deceived developers into installing them, enabling data exfiltration via a Discord webhook and command and control establishment. 

Leveraging legitimate-looking commands and a trusted service (replit.dev) further obfuscated the malicious intent, which highlights the importance of careful package review before installation.

The threat actor posing their malicious package as a legitimate library to deceive users.
The threat actor posing their malicious package as a legitimate library to deceive users.

Malicious npm packages were recently downloaded over 600 times, stealing credentials and sensitive data from affected users. Despite the npm registry’s swift removal, the impact was substantial. 

According to Socket, the attack, resembling a November 2024 incident, demonstrates the rapid evolution of threat actors who reuse malware (like Skuld) and refine their deception techniques. 

To mitigate this, developers should implement a layered security approach. Employing automated tools can proactively scan for and block malicious dependencies within the development lifecycle, intercepting threats before they compromise systems.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Windows Kerberos Vulnerability Enables Security Feature Bypass

Microsoft has disclosed a new security vulnerability in Windows operating systems, tracked as CVE-2025-29809.This flaw,...

Ransomware Groups Target Organizations to Exfiltrate Data and Blackmail via Leak Site Posts

Ransomware attacks have continued their relentless assault on organizations worldwide, with a focus on...

Hellcat Ransomware Upgrades Arsenal to Target Government, Education, and Energy Sectors

The cybersecurity community has raised alarms over the rapid evolution of the Hellcat ransomware...

Ransomware Group Actively Exploits Windows CLFS Zero-Day Vulnerability

Microsoft has uncovered a sophisticated ransomware campaign exploiting a zero-day vulnerability in the Windows...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Windows Kerberos Vulnerability Enables Security Feature Bypass

Microsoft has disclosed a new security vulnerability in Windows operating systems, tracked as CVE-2025-29809.This flaw,...

Ransomware Groups Target Organizations to Exfiltrate Data and Blackmail via Leak Site Posts

Ransomware attacks have continued their relentless assault on organizations worldwide, with a focus on...

Hellcat Ransomware Upgrades Arsenal to Target Government, Education, and Energy Sectors

The cybersecurity community has raised alarms over the rapid evolution of the Hellcat ransomware...