[ad_1]
Hackers hijacked the favored UA-Parser-JS NPM library, with thousands and thousands of downloads per week, to contaminate Linux and Home windows units with cryptominers and password-stealing trojans in a supply-chain assault.
The UA-Parser-JS library is used to parse a browser’s consumer agent to determine a customer’s browser, engine, OS, CPU, and Gadget kind/mannequin.
The library is immensely fashionable, with thousands and thousands of downloads per week and over 24 million downloads this month up to now. As well as, the library is utilized in over a thousand different tasks, together with these by Fb, Microsoft, Amazon, Instagram, Google, Slack, Mozilla, Discord, Elastic, Intuit, Reddit, and many extra well-known corporations.

Supply: NPM-stat.com
UA-Parser-JS challenge hijacked to put in malware
On October twenty second, a risk actor printed malicious variations of the UA-Parser-JS NPM library to put in cryptominers and password-stealing trojans on Linux and Home windows units.
In line with the developer, his NPM account was hijacked and used to deploy the three malicious variations of the library.
“I seen one thing uncommon when my e mail was all of a sudden flooded by spams from a whole lot of internet sites (perhaps so I do not understand one thing was up, fortunately the impact is sort of the opposite),” defined Faisal Salman, the developer of UA-Parser-JS, in a bug report.
“I imagine somebody was hijacking my npm account and printed some compromised packages (0.7.29
, 0.8.0
, 1.0.0
) which is able to most likely set up malware as may be seen from the diff right here: https://app.renovatebot.com/package-diff?title=ua-parser-js&from=0.7.28&to=1.0.0.”
The affected variations and their patched counterparts are:
Malicious model | Fastened model |
0.7.29 | 0.7.30 |
0.8.0 | 0.8.1 |
1.0.0 | 1.0.1 |
From copies of the malicious NPMs shared with BleepingComputer by Sonatype, we will higher perceive the assault.
When the compromised packages are put in on a consumer’s system, a preinstall.js script will verify the kind of working system used on the system and both launch a Linux shell script or a Home windows batch file.

If the package deal is on a Linux system, a preinstall.sh script will probably be executed to verify if the consumer is positioned in Russia, Ukraine, Belarus, and Kazakhstan. If the system isn’t positioned in these international locations, the script will obtain the jsextension program from 159[.]148[.]186[.]228 and execute it.
The jsextension program is an XMRig Monero miner, which is able to use solely 50% of the system’s CPU to keep away from being simply detected.

For Home windows units, the batch file can even obtain the XMRig Monero cryptominer and reserve it as jsextension.exe and execute it. As well as, the batch file will obtain an sdd.dll file [VirusTotal] from citationsherbe[.]at and save it as create.dll.

The downloaded DLL is a password-stealing trojan that can try to steal the passwords saved on the system.
When the DLL is loaded utilizing the regsvr32.exe -s create.dll
command, it should try to steal passwords for all kinds of packages, together with FTP shoppers, VNC, messaging software program, e mail shoppers, and browsers.
A listing of focused packages may be discovered within the desk under.
WinVNC | Firefox | FTP Management |
Display Saver 9x | Apple Safari | NetDrive |
PC Distant Management | Distant Desktop Connection | Becky |
ASP.NET Account | Cisco VPN Consumer | The Bat! |
FreeCall | GetRight | Outlook |
Vypress Auvis | FlashGet/JetCar | Eudora |
CamFrog | FAR Supervisor FTP | Gmail Notifier |
Win9x NetCache | Home windows/Whole Commander | Mail.Ru Agent |
ICQ2003/Lite | WS_FTP | IncrediMail |
“&RQ, R&Q” | CuteFTP | Group Mail Free |
Yahoo! Messenger | FlashFXP | PocoMail |
Digsby | FileZilla | Forte Agent |
Odigo | FTP Commander | Scribe |
IM2/Messenger 2 | BulletProof FTP Consumer | POP Peeper |
Google Discuss | SmartFTP | Mail Commander |
Faim | TurboFTP | Home windows Dwell Mail |
MySpaceIM | FFFTP | Mozilla Thunderbird |
MSN Messenger | CoffeeCup FTP | SeaMonkey |
Home windows Dwell Messenger | Core FTP | Flock |
Paltalk | FTP Explorer | Obtain Grasp |
Excite Non-public Messenger | Frigate3 FTP | Web Obtain Accelerator |
Gizmo Undertaking | SecureFX | IEWebCert |
AIM Professional | UltraFXP | IEAutoCompletePWs |
Pandion | FTPRush | VPN Accounts |
Trillian Astra | WebSitePublisher | Miranda |
888Poker | BitKinex | GAIM |
FullTiltPoker | ExpanDrive | Pidgin |
PokerStars | Traditional FTP | QIP.On-line |
TitanPoker | Fling | JAJC |
PartyPoker | SoftX FTP Consumer | WebCred |
CakePoker | Listing Opus | Home windows Credentials |
UBPoker | FTP Uploader | MuxaSoft Dialer |
EType Dialer | FreeFTP/DirectFTP | FlexibleSoft Dialer |
RAS Passwords | LeapFTP | Dialer Queen |
Web Explorer | WinSCP | VDialer |
Chrome | 32bit FTP | Superior Dialer |
Opera | WebDrive | Home windows RAS |
Along with stealing passwords from the above packages, the DLL will execute a PowerShell script to steal passwords from the Home windows credential supervisor, as proven under.

This assault seems to have been carried out by the identical risk actor behind different malicious NPM libraries found this week.
Researchers from open-source safety agency Sonatype found three malicious NPM libraries used to deploy cryptominers on Linux and Home windows units in an nearly an identical method.
What ought to UA-Parser-JS customers do?
Because of the widespread affect of this supply-chain assault, it’s strongly suggested that each one customers of the UA-Parser-JS library verify their tasks for malicious software program.
This consists of checking for the existence of both jsextension.exe (Home windows) or jsextension (Linux) and deleting them if they’re discovered.
For Home windows customers, you need to scan your system for a create.dll file and delete it instantly.
You must also change your passwords as they have been most certainly stolen and despatched to the risk actor.
Whereas altering your passwords will probably be an enormous endeavor, by not doing so, the risk actor can compromise your on-line accounts, together with any tasks you develop for additional supply-chain assaults.
[ad_2]