Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New npm Malware Campaign Redirects Victims to Crypto Sites
News

New npm Malware Campaign Redirects Victims to Crypto Sites

Team-CWDBy Team-CWDNovember 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new malware campaign built around seven npm packages has been uncovered by cybersecurity experts.

The campaign, observed by the Socket Threat Research Team, is operated by a threat actor known as dino_reborn. It uses a mix of cloaking tools, anti-analysis controls and fake crypto-exchange CAPTCHAs to identify whether a visitor is a potential victim or a security researcher.

Six of the packages contain nearly identical 39 KB malware samples, while a seventh constructs a façade webpage.

All seven remained live until takedown requests placed them into security holding. The packages include signals-embed, dsidospsodlks, applicationooks21, application-phskck, integrator-filescrypt2025, integrator-2829 and integrator-2830.

How the Campaign Operated

Each malicious package executed automatically through an IIFE and immediately began collecting a detailed fingerprint of the visiting device. Thirteen data points were gathered, ranging from user agent to language settings. These details were then forwarded through a proxy to the Adspect API, a traffic-cloaking service.

If the Adspect API decided the visitor is a security researcher, the code displayed a “white page” constructed from static assets. If it determined the visitor is a victim, a fake CAPTCHA branded with standx.com, jup.ag or uniswap.org appeared. After a brief delay, the CAPTCHA redirected the victim to a malicious URL supplied by Adspect.

Read more on crypto-focused threat campaigns: New NCA Campaign Warns Men Off Crypto Investment Scams

The malware packages and the façade webpage communicated using shared container IDs. Signals-embed builds the white page that researchers saw, while fallback code inside the malware reconstructed a branded Offlido page if the network failed. Anti-analysis features blocked right-click, F12, Ctrl+U and detected open DevTools, causing the page to reload.

Key indicators of this campaign include:

  • Use of /adspect-proxy.php and /adspect-file.php paths

  • JavaScript that disables user interactions

  • Dynamic redirects tied to Adspect stream IDs

Outlook and Defensive Guidance

Socket researchers said this campaign merges open source distribution with techniques traditionally seen in malvertising operations. Because Adspect returns fresh redirect URLs on each request, payloads can shift rapidly. 

“Defenders should expect continued abuse of Adspect-style cloaking and proxy infrastructure in browser-executed open source packages. These tactics will likely reappear with new brand façades and new package names,” the security experts warned.

“Web teams should treat unexpected scripts that disable user interactions or that post detailed client fingerprints to unfamiliar PHP endpoints as immediate red flags. Network defenders should monitor for /adspect-proxy.php and /adspect-file.php paths across any domains, as these serve as reliable indicators of this actor’s toolkit.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleLarge-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware
Next Article New Browser Security Report Reveals Emerging Threats for Enterprises
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

When ‘hacking’ your game becomes a security risk

October 17, 2025

Find your weak spots before attackers do

November 21, 2025

How cybercriminals are targeting content creators

November 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.