A recent discovery within the npm package registry has exposed a new form of deception, as a rogue package delivered rootkit functionality for the first time. This deceptive package, named "node-hide-console-windows," closely resembled the legitimate npm package "node-hide-console-window," in a classic example of typosquatting. Before it was eventually removed, this malicious package managed to amass 704 downloads in just two months. ReversingLabs first detected this suspicious activity in August 2023. The package, when executed, secretly downloaded a Discord bot that was used to introduce an open-source rootkit called "r77." This development highlights the growing trend of leveraging open-source projects as a means to distribute malware. The malicious code was concealed within the package's "index.js" file, which, upon execution, initiated the download and automatic execution of an executable file. The executable file in question is a C#-based open-source trojan known as "DiscordRAT 2.0." This trojan boasts over 40 commands that allow attackers to remotely take control of a victim's system through Discord. These commands facilitate the collection of sensitive data and the disabling of security software. Notably, one of the instructions is "!rootkit," which triggers the deployment of the "r77" rootkit on the compromised system. "r77," actively maintained by bytecode77, is a fileless ring 3 rootkit designed to conceal files and processes. It can be bundled with other software or launched independently. This isn't the first time "r77" has been used in malicious campaigns, as threat actors have previously incorporated it into attack chains to distribute the SeroXen trojan and cryptocurrency miners. Additionally, two different versions of "node-hide-console-windows" have been discovered fetching an open-source information stealer called "Blank-Grabber," alongside "DiscordRAT 2.0," masquerading as a visual code update. What sets this campaign apart is that it relies entirely on publicly available online components, making it relatively easy for threat actors to assemble. This scenario has now opened the door to supply chain attacks for even low-stakes actors.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...