NPM Malware Campaign Uses Visitor Profiling to Evade Detection
A new malware campaign targeting the npm ecosystem uses cloaking techniques to tell apart real users from security researchers. Seven malicious packages created by an actor known as “dino_reborn” redirect users to phishing sites only when the visitor is identified as a likely victim. The payload fingerprinters browser behavior and blocks developer tools, keyboard shortcuts, and context menus. If the visitor seems benign (like a researcher), the page stays blank — helping the campaign avoid analysis.
Comments
Post a Comment