Researchers found a malware marketing campaign concentrating on the npm ecosystem, distributing the Skuld information stealer by malicious packages disguised as legit instruments. The risk actor, “k303903,” compromised a whole bunch of machines earlier than the packages have been eliminated.
Subsequent evaluation revealed that “k303903” seemingly operates beneath the aliases “shegotit2” and “pressurized,” all exhibiting similar or extremely related ways, methods, and procedures (TTPs) to infiltrate the npm ecosystem with malware by demonstrating the persistent risk of provide chain assaults and the necessity for heightened safety measures inside the improvement ecosystem.
A malicious marketing campaign concentrating on npm builders delivered the Skuld infostealer, marking the second such assault in two months, which intently resembles a earlier assault on Roblox builders, demonstrating the attackers’ adaptability.


The risk actors employed typosquatting and obfuscation methods to compromise improvement machines and exfiltrate delicate knowledge, which showcases a recurring sample the place attackers shortly adapt their methods after preliminary success, reintroducing threats with new packaging and distribution strategies.
2024 MITRE ATT&CK Analysis Outcomes for SMEs & MSPs -> Obtain Free Information
The December 2024 marketing campaign leveraged widespread deployment strategies and relied on commodity malware, highlighting the constant use of misleading ways by these risk actors.
The code snippet reveals a malicious obtain and execution course of by using libraries like `fs-extra`, `path`, `node-fetch`, and `child_process` to obtain a malicious binary from a URL disguised to seem legit after which execute it.
Obfuscator.io was used to obfuscate the code, making preliminary detection difficult. As soon as put in, the malware fetches and executes the payload (Skuld infostealer) beneath the filename obtain.exe.


Actor k303903 used typosquatting to add malicious npm packages that resembled fashionable libraries, which deceived builders into putting in them, enabling knowledge exfiltration by way of a Discord webhook and command and management institution.
Leveraging legitimate-looking instructions and a trusted service (replit.dev) additional obfuscated the malicious intent, which highlights the significance of cautious bundle overview earlier than set up.


Malicious npm packages have been lately downloaded over 600 occasions, stealing credentials and delicate knowledge from affected customers. Regardless of the npm registry’s swift removing, the impression was substantial.
Based on Socket, the assault, resembling a November 2024 incident, demonstrates the fast evolution of risk actors who reuse malware (like Skuld) and refine their deception methods.
To mitigate this, builders ought to implement a layered safety strategy. Using automated instruments can proactively scan for and block malicious dependencies inside the improvement lifecycle, intercepting threats earlier than they compromise techniques.
Examine Actual-World Malicious Hyperlinks, Malware & Phishing Assaults With ANY.RUN – Strive for Free