As per sources, it is reported that since the beginning of August 2023, more than a dozen malicious packages have been identified on the npm package repository, posing a significant threat to Roblox developers and gaming Platform. These packages are designed to deploy an open-source information stealer known as Luna Token Grabber onto systems owned by Roblox developers. The attack, which was initially detected by ReversingLabs on August 1, involves fraudulent modules disguising themselves as the genuine package "noblox.js," an API wrapper utilized for creating scripts that interact with the Roblox gaming platform. Moreover, these malicious packages mimic code from the authentic noblox.js package but introduce harmful functions focused on stealing information. Despite their counterfeit nature, they managed to accumulate a total of 963 downloads before being removed. Noteworthy among the deceptive packages are "noblox.js-vps" (versions 4.14.0 to 4.23.0), "noblox.js-ssh" (versions 4.2.3 to 4.2.5), and "noblox.js-secure" (versions 4.1.0, 4.2.0 to 4.2.3). Further, a distinctive aspect of this attack is the utilisation of an executable that deploys Luna Grabber, marking a relatively rare instance of a multi-stage infection sequence discovered within npm. ReversingLabs also highlighted that the sophistication of these attacks lies in the efforts undertaken by malicious actors to make their counterfeit packages appear genuine. These malicious modules effectively conceal their harmful functionality in a separate file named "postinstall.js," which is executed after installation. This technique capitalizes on the fact that the authentic noblox.js package also uses a file with the same name for benign purposes. However, the malicious variants leverage this file to check if the package is installed on a Windows system. Next, they proceed to download and execute a second-stage payload hosted on the Discord CDN, or alternatively, display an error message. ReversingLabs noted that this second-stage payload continually evolves with each iteration, enhancing its functionality and employing obfuscation mechanisms to evade detection. Its primary role is to facilitate the download of Luna Token Grabber, a Python tool capable of extracting credentials from web browsers and Discord tokens. However, the threat actor behind this NPM campaign appears to focus primarily on harvesting system information from victims using a configurable builder provided by the authors of Luna Token Grabber. Additionally, the incident reinforces the trend of malicious actors employing typosquatting to deceive developers into unwittingly downloading malicious code through deceptive package names.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...