Cyber Security News

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through malicious packages disguised as legitimate tools. The threat actor, “k303903,” compromised hundreds of machines before the packages were removed. 

Subsequent analysis revealed that “k303903” likely operates under the aliases “shegotit2” and “pressurized,” all exhibiting identical or highly similar tactics, techniques, and procedures (TTPs) to infiltrate the npm ecosystem with malware by demonstrating the persistent threat of supply chain attacks and the need for heightened security measures within the development ecosystem.

A malicious campaign targeting npm developers delivered the Skuld infostealer, marking the second such attack in two months, which closely resembles a previous attack on Roblox developers, demonstrating the attackers’ adaptability. 

Skuld’s ability to steal passwords, cookies, sensitive files, and browsing history from Chromium and Gecko-based browsers.

The threat actors employed typosquatting and obfuscation techniques to compromise development machines and exfiltrate sensitive data, which showcases a recurring pattern where attackers quickly adapt their strategies after initial success, reintroducing threats with new packaging and distribution methods. 

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

The December 2024 campaign leveraged common deployment methods and relied on commodity malware, highlighting the consistent use of deceptive tactics by these threat actors.

The code snippet reveals a malicious download and execution process by utilizing libraries like `fs-extra`, `path`, `node-fetch`, and `child_process` to download a malicious binary from a URL disguised to appear legitimate and then execute it. 

Obfuscator.io was used to obfuscate the code, making initial detection challenging. Once installed, the malware fetches and executes the payload (Skuld infostealer) under the filename download.exe.

contextual details about the malicious package.

Actor k303903 used typosquatting to upload malicious npm packages that resembled popular libraries, which deceived developers into installing them, enabling data exfiltration via a Discord webhook and command and control establishment. 

Leveraging legitimate-looking commands and a trusted service (replit.dev) further obfuscated the malicious intent, which highlights the importance of careful package review before installation.

The threat actor posing their malicious package as a legitimate library to deceive users.

Malicious npm packages were recently downloaded over 600 times, stealing credentials and sensitive data from affected users. Despite the npm registry’s swift removal, the impact was substantial. 

According to Socket, the attack, resembling a November 2024 incident, demonstrates the rapid evolution of threat actors who reuse malware (like Skuld) and refine their deception techniques. 

To mitigate this, developers should implement a layered security approach. Employing automated tools can proactively scan for and block malicious dependencies within the development lifecycle, intercepting threats before they compromise systems.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due to…

11 hours ago

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost savings.…

12 hours ago

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies adopt…

12 hours ago

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking" (WTH),…

12 hours ago

From ISO to NIS2 – Mapping Compliance Requirements Globally

The global regulatory landscape for cybersecurity is undergoing a seismic shift, with the European Union’s…

12 hours ago

PasivRobber Malware Emerges, Targeting macOS to Steal Data From Systems and Apps

A sophisticated new malware suite targeting macOS, dubbed "PasivRobber," has been discovered by security researchers.…

12 hours ago