Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns

November 19, 2025

Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

November 19, 2025

China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers

November 19, 2025
Facebook X (Twitter) Instagram
Wednesday, November 19
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New npm Malware Campaign Redirects Victims to Crypto Sites
News

New npm Malware Campaign Redirects Victims to Crypto Sites

Team-CWDBy Team-CWDNovember 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new malware campaign built around seven npm packages has been uncovered by cybersecurity experts.

The campaign, observed by the Socket Threat Research Team, is operated by a threat actor known as dino_reborn. It uses a mix of cloaking tools, anti-analysis controls and fake crypto-exchange CAPTCHAs to identify whether a visitor is a potential victim or a security researcher.

Six of the packages contain nearly identical 39 KB malware samples, while a seventh constructs a façade webpage.

All seven remained live until takedown requests placed them into security holding. The packages include signals-embed, dsidospsodlks, applicationooks21, application-phskck, integrator-filescrypt2025, integrator-2829 and integrator-2830.

How the Campaign Operated

Each malicious package executed automatically through an IIFE and immediately began collecting a detailed fingerprint of the visiting device. Thirteen data points were gathered, ranging from user agent to language settings. These details were then forwarded through a proxy to the Adspect API, a traffic-cloaking service.

If the Adspect API decided the visitor is a security researcher, the code displayed a “white page” constructed from static assets. If it determined the visitor is a victim, a fake CAPTCHA branded with standx.com, jup.ag or uniswap.org appeared. After a brief delay, the CAPTCHA redirected the victim to a malicious URL supplied by Adspect.

Read more on crypto-focused threat campaigns: New NCA Campaign Warns Men Off Crypto Investment Scams

The malware packages and the façade webpage communicated using shared container IDs. Signals-embed builds the white page that researchers saw, while fallback code inside the malware reconstructed a branded Offlido page if the network failed. Anti-analysis features blocked right-click, F12, Ctrl+U and detected open DevTools, causing the page to reload.

Key indicators of this campaign include:

  • Use of /adspect-proxy.php and /adspect-file.php paths

  • JavaScript that disables user interactions

  • Dynamic redirects tied to Adspect stream IDs

Outlook and Defensive Guidance

Socket researchers said this campaign merges open source distribution with techniques traditionally seen in malvertising operations. Because Adspect returns fresh redirect URLs on each request, payloads can shift rapidly. 

“Defenders should expect continued abuse of Adspect-style cloaking and proxy infrastructure in browser-executed open source packages. These tactics will likely reappear with new brand façades and new package names,” the security experts warned.

“Web teams should treat unexpected scripts that disable user interactions or that post detailed client fingerprints to unfamiliar PHP endpoints as immediate red flags. Network defenders should monitor for /adspect-proxy.php and /adspect-file.php paths across any domains, as these serve as reliable indicators of this actor’s toolkit.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleLarge-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware
Next Article New Browser Security Report Reveals Emerging Threats for Enterprises
Team-CWD
  • Website

Related Posts

News

PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns

November 19, 2025
News

Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

November 19, 2025
News

China-Linked Operation “WrtHug” Hijacks Thousands of ASUS Routers

November 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.