Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (socket.dev) Malicious Activity Detected in New Versions of node-ipc npm Package: Stealer and Backdoor Behavior Identified

(socket.dev) Malicious Activity Detected in New Versions of node-ipc npm Package: Stealer and Backdoor Behavior Identified

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (socket.dev) Malicious Activity Detected in New Versions of node-ipc npm Package: Stealer and Backdoor Behavior Identified

    Newly published versions of the node-ipc npm package (9.1.6, 9.2.3, 12.0.1) identified as malware with stealer/backdoor capabilities. Host fingerprinting, file enumeration, and encrypted data exfiltration detected. Immediate blocking and auditing of affected versions advised.

    In brief - Critical supply chain compromise in node-ipc npm package (versions 9.1.6, 9.2.3, 12.0.1) introduces stealer/backdoor functionality, enabling data exfiltration and system compromise. Historical malicious activity (e.g., geo-targeted destructive payloads in 10.1.1/10.1.2) underscores persistent risks in JavaScript dependencies.

    Technically - Malicious node-ipc versions employ host environment fingerprinting, local file enumeration, and data compression before exfiltrating payloads via encrypted envelopes. Network endpoints dynamically selected via DNS or hardcoded logic. Prior incidents include CVE-less destructive malware (10.1.1/10.1.2) and peacenotwar dependency abuse (11.0.0/11.1.0). Socket’s AI scanner flagged these as malware within minutes of publication.

    Source: https://socket.dev/blog/node-ipc-package-compromised

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups