HomeCyber SecurityRogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on...

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Methods


Apr 19, 2025Ravie LakshmananLinux / Malware

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Methods

Cybersecurity researchers have uncovered three malicious packages within the npm registry that masquerade as a well-liked Telegram bot library however harbor SSH backdoors and knowledge exfiltration capabilities.

The packages in query are listed under –

Cybersecurity

Based on provide chain safety agency Socket, the packages are designed to imitate node-telegram-bot-api, a well-liked Node.js Telegram Bot API with over 100,000 weekly downloads. The three libraries are nonetheless out there for obtain.

“Whereas that quantity might sound modest, it solely takes a single compromised setting to pave the best way for wide-scale infiltration or unauthorized knowledge entry,” safety researcher Kush Pandya stated.

“Provide chain safety incidents repeatedly present that even a handful of installs can have catastrophic repercussions, particularly when attackers achieve direct entry to developer methods or manufacturing servers.”

The rogue packages not solely replicate the outline of the official library, but additionally leverage a way referred to as starjacking in a bid to raise the authenticity and trick unsuspecting builders into downloading them.

Starjacking refers to an method the place an open-source package deal is made to be extra standard than it’s by linking the GitHub repository related to the official library. This sometimes takes benefit of the non-existing validation of the relation between the package deal and the GitHub repository.

SSH Backdoors on Linux Systems

Socket’s evaluation discovered that the packages are designed to explicitly work on Linux methods, including two SSH keys to the “~/.ssh/authorized_keys” file, thus granting the attackers persistent distant entry to the host.

The script is designed to gather the system username and the exterior IP handle by contacting “ipinfo[.]io/ip.” It additionally beacons out to an exterior server (“solana.validator[.]weblog”) to verify the an infection.

What makes the packages sneaky is that eradicating them doesn’t utterly get rid of the risk, because the inserted SSH keys grant unfettered distant entry to the risk actors for subsequent code execution and knowledge exfiltration.

Cybersecurity

The disclosure comes as Socket detailed one other malicious package deal named @naderabdi/merchant-advcash that is engineered to launch a reverse shell to a distant server whereas disguising as a Volet (previously Advcash) integration.

“The package deal @naderabdi/merchant-advcash accommodates hardcoded logic that opens a reverse shell to a distant server upon invocation of a cost success handler,” the corporate stated. “It’s disguised as a utility for retailers to obtain, validate, and handle cryptocurrency or fiat funds.”

“Not like many malicious packages that execute code throughout set up or import, this payload is delayed till runtime, particularly, after a profitable transaction. This method might assist evade detection, because the malicious code solely runs underneath particular runtime circumstances.”

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments