NEW: Unlock the Future of Finance with CRYPTO ENDEVR - Explore, Invest, and Prosper in Crypto!
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
No Result
View All Result

Malicious npm packages found to create a backdoor in legitimate code

Malicious npm packages found to create a backdoor in legitimate code
Share on FacebookShare on Twitter

The Ethers-Providerz Package: A Closer Look

Similarities with Ethers-Provider2

The ethers-providerz package is very similar to ethers-provider2, but earlier versions reveal the attackers experimented with different approaches until landing on the current implementation. For example, in that version the attackers tried to patch files from a package called strong>@ethersproject/providers.

The Additional File Loader.js

Also, the additional file loader.js that contains the download code for the third-stage payload is created in the node_modules folder, where usually all npm packages reside. The interesting part is that there is a legitimate npm package called loader.js that has over 24 million downloads and 5,200 dependent applications. If this package is already present locally, the malware will patch it. If it’s not, it will impersonate it.

Evasive Techniques Used by Attackers

"While not as common as infostealers on the npm platform, downloaders are far from uncommon and are frequently encountered," the ReversingLabs researchers said. "However, this downloader is notable because of the exceptional strategies employed by the attackers to hide the malicious payload it delivered. These evasive techniques were more thorough and effective than we have observed in npm-based downloaders before."

Conclusion

In conclusion, the ethers-providerz package is a sophisticated tool used by attackers to hide malicious payloads. Its similarities with ethers-provider2 and the additional file loader.js created in the node_modules folder make it a challenging target for detection. The evasive techniques used by the attackers to hide the malicious payload make it a notable case study in the field of cybersecurity.

FAQs

Q: What is the purpose of the ethers-providerz package?
A: The purpose of the ethers-providerz package is to hide malicious payloads and deliver them to targeted systems.

Q: How does the package work?
A: The package works by creating a file loader.js that contains the download code for the third-stage payload in the node_modules folder. If the package is already present locally, the malware will patch it. If it’s not, it will impersonate it.

Q: What are some notable features of this downloader?
A: Some notable features of this downloader are its evasive techniques, such as patching legitimate npm packages and impersonating existing packages. These techniques make it more challenging to detect and remove the malicious payload.

Q: How common are downloaders on the npm platform?
A: While not as common as infostealers, downloaders are far from uncommon and are frequently encountered. However, this downloader is notable due to its exceptional strategies employed to hide the malicious payload.

cryptoendevr

cryptoendevr

Related Stories

“Ransomware, was ist das?”

“Ransomware, was ist das?”

July 10, 2025
0

Rewrite the width="5175" height="2910" sizes="(max-width: 5175px) 100vw, 5175px">Gefahr nicht erkannt, Gefahr nicht gebannt.Leremy – shutterstock.com KI-Anbieter Cohesity hat 1.000 Mitarbeitende...

BTR: AI, Compliance, and the Future of Mainframe Modernization

BTR: AI, Compliance, and the Future of Mainframe Modernization

July 10, 2025
0

Rewrite the As artificial intelligence (AI) reshapes the enterprise technology landscape, industry leaders are rethinking modernization strategies to balance agility,...

Warning to ServiceNow admins: Fix your access control lists now

Warning to ServiceNow admins: Fix your access control lists now

July 9, 2025
0

Rewrite the “This vulnerability was relatively simple to exploit, and required only minimal table access, such as a weak user...

Palantir and Tomorrow.io Partner to Operationalize Global Weather Intelligence and Agentic AI

Palantir and Tomorrow.io Partner to Operationalize Global Weather Intelligence and Agentic AI

July 9, 2025
0

Rewrite the Palantir Technologies Inc., a leading provider of enterprise operating systems, and Tomorrow.io, a leading weather intelligence and resilience...

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Bitcoin Short-Term Holder Shakeout Could Accelerate Recovery Above Key Level

Bitcoin Short-Term Holder Shakeout Could Accelerate Recovery Above Key Level

December 3, 2025
ETH briefly touches K but traders remain skeptical: Here’s why

ETH briefly touches $3K but traders remain skeptical: Here’s why

December 3, 2025
Ether Treasury Stocks Lead Crypto Recovery Gains

Ether Treasury Stocks Lead Crypto Recovery Gains

December 3, 2025
Haven – Blockchain With Biometric Authentication

Haven – Blockchain With Biometric Authentication

December 3, 2025
Here’s How Many Shiba Inu (SHIB) Tokens Were Burned in November

Here’s How Many Shiba Inu (SHIB) Tokens Were Burned in November

December 2, 2025

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

CRYPTO ENDEVR

About Us

Crypto Endevr aims to simplify the vast world of cryptocurrencies and blockchain technology for our readers by curating the most relevant and insightful articles from around the web. Whether you’re a seasoned investor or new to the crypto scene, our mission is to deliver a streamlined feed of news and analysis that keeps you informed and ahead of the curve.

Links

Home
Privacy Policy
Terms and Services

Resources

Glossary

Other

About Us
Contact Us

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

© Copyright 2024. All Right Reserved By Crypto Endevr.

No Result
View All Result
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms

Copyright © 2024. All Right Reserved By Crypto Endevr