Malware-laced npm packages used to target Discord users

Threat actors used multiple npm packages to target Discord users with malware designed to steal their payment card data.

A malicious campaign targeting Discord users leverages multiple npm packages to deliver malware that steals their payment card information, Kaspersky researchers warn.

The malicious code hidden in the packages, and tracked as Lofy Stealer, is a modified version of an open-source token logger called Volt Stealer,

“The Python malware is a modified version of an open-source token logger called Volt Stealer. It is intended to steal Discord tokens from infected machines, along with the victim’s IP address, and upload them via HTTP.” reads the analysis published by Kaspersky.

The malicious code can detect when a user logs in, change email or password, enable/disable multi-factor authentication (MFA) and add new payment methods, including complete bank card details. The harvested data are uploaded to the remote endpoint whose address is hardcoded (e.g., life.polarlabs.repl[.]co, sock.polarlabs.repl[.]co, idk.polarlabs.repl[.]co).

Below is the timeline of uploaded malicious packages, which include the small-smpern-validslifeculer, or proc-title malicious npm modules:

Package nameVersionTimestamp (UTC)
small-sm8.2.02022-07-17 20:28:29
small-sm4.2.02022-07-17 19:47:56
small-sm4.0.02022-07-17 19:43:57
small-sm1.1.02022-06-18 16:19:47
small-sm1.0.92022-06-17 12:23:33
small-sm1.0.82022-06-17 12:22:31
small-sm1.0.72022-06-17 03:36:45
small-sm1.0.52022-06-17 03:31:40
pern-valids1.0.32022-06-17 03:19:45
pern-valids1.0.22022-06-17 03:12:03
lifeculer0.0.12022-06-17 02:50:34
proc-title1.0.32022-03-04 05:43:31
proc-title1.0.22022-03-04 05:29:58

Once harvested, this data is uploaded to one of several Replit-hosted instances whose addresses are hard-coded within the malware (e.g., life.polarlabs.repl[.]co, sock.polarlabs.repl[.]co, idk.polarlabs.repl[.]co).

Kaspersky states that they are constantly monitoring the updates to repositories to rapidly detect all new malicious packages.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Discord)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini: Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

This website uses cookies.