Malicious npm Packages Mimicking ‘noblox.js’ Compromise Roblox Developers’ Systems

Cyber Security

Sep 02, 2024Ravie LakshmananSoftware Security / Malware

Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once again underscoring how threat actors continue to exploit the trust in the open-source ecosystem to deliver malware.

“By mimicking the popular ‘noblox.js’ library, attackers have published dozens of packages designed to steal sensitive data and compromise systems,” Checkmarx researcher Yehuda Gelb said in a technical report.

Details about the campaign were first documented by ReversingLabs in August 2023 as part of a campaign that delivered a stealer called Luna Token Grabber, which it said was a “replay of an attack uncovered two years ago” in October 2021.

Cybersecurity

Since the start of the year, two other packages called noblox.js-proxy-server and noblox-ts were identified as malicious and impersonating the popular Node.js library to deliver stealer malware and a remote access trojan named Quasar RAT.

“The attackers of this campaign have employed techniques including brandjacking, combosquatting, and starjacking to create a convincing illusion of legitimacy for their malicious packages,” Gelb said,

To that end, the packages are given a veneer of legitimacy by naming them noblox.js-async, noblox.js-thread, noblox.js-threads, and noblox.js-api, giving the impression to unsuspecting developers that these libraries are related to the legitimate “noblox.js” package.

The package download stats are listed below –

Another technique employed is starjacking, in which the phony packages list the source repository as that of the actual noblox.js library to make it seem more reputable.

The malicious code embedded in the latest iteration acts as a gateway for serving additional payloads hosted on a GitHub repository, while simultaneously stealing Discord tokens, updating the Microsoft Defender Antivirus exclusion list to evade detection, and setting up persistence by means of a Windows Registry change.

Cybersecurity

“Central to the malware’s effectiveness is its approach to persistence, leveraging the Windows Settings app to ensure sustained access,” Gelb noted. “As a result, whenever a user attempts to open the Windows Settings app, the system inadvertently executes the malware instead.”

The end goal of the attack chain is the deployment of Quasar RAT granting the attacker remote control over the infected system. The harvested information is exfiltrated to the attacker’s command-and-control (C2) server using a Discord webhook.

The findings are an indication a steady stream of new packages continue to be published despite takedown efforts, making it essential that developers stay vigilant against the ongoing threat.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

Products You May Like

Articles You May Like

U.S. Agencies Warn of Iranian Hacking Group’s Ongoing Ransomware Attacks
French Authorities Charge Telegram CEO with Facilitating Criminal Activities on Platform
Airtel Payments Bank Smartwatch With RuPay Chip Launched in India in Partnership With Noise and NPCI
Fortra Issues Patch for High-Risk FileCatalyst Workflow Security Vulnerability
NCLT Approves Merger of Viacom 18, Star India After CCI Nod

Leave a Reply

Your email address will not be published. Required fields are marked *