Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»npm Package Uses QR Code Steganography to Steal Credentials
News

npm Package Uses QR Code Steganography to Steal Credentials

Team-CWDBy Team-CWDSeptember 24, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A malicious npm package named Fezbox has been found using an unusual technique to conceal harmful code.

The package employs a QR code as part of its obfuscation strategy, ultimately aiming to steal usernames and passwords from web cookies.

The discovery was made by the Socket Threat Research Team.

A New Obfuscation Method

While attackers often rely on methods like string reversal, encoding or encryption to hide malware, Fezbox goes further by embedding a payload inside a QR code. Once activated, the code attempts to extract user credentials from browser cookies and transmit them to a remote server.

Socket flagged the package through its AI-based malware scanner, which identified suspicious behaviors hidden beneath seemingly harmless utility functions. The package, which had at least 327 downloads, has since been removed following Socket’s petition to the npm security team for its takedown and the suspension of the associated account.

Read more on supply chain attacks: GhostAction Supply Chain Attack Compromises 3000+ Secrets

How the Payload Works

Fezbox presents itself as a JavaScript/TypeScript helper library with features like QR code generation.

The documentation does not disclose, however, that the library will fetch a QR code from a remote URL and execute whatever code is inside. After a 120-second delay, the malicious script loads and parses the QR code, then runs the hidden payload.

Once decoded, the payload attempts to:

  • Retrieve a stored username and password from browser cookies

  • Reverse the string “drowssap” to disguise its intent

  • Send the stolen credentials via HTTPS POST to a server hosted on Railway

According to Socket, the use of multiple obfuscation layers, including string reversal, QR code steganography and payload encryption, demonstrates the actor’s focus on stealth.

Lessons for Defenders

Although many modern applications no longer store plain passwords in cookies, the attack highlights the growing creativity in malware design.

“Using a QR code as a steganographic obfuscation technique is quite clever,” the Socket team noted, “[It] shows yet again that threat actors will continue to use any and all tools at their disposal.”

The company also emphasized the importance of automated dependency scanning to catch malicious packages before they are introduced into software projects.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePhoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds
Next Article Introducing Astrix’s AI Agent Control Plane
Team-CWD
  • Website

Related Posts

News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What it is and how to protect yourself

January 8, 2026

Common Apple Pay scams, and how to stay safe

January 22, 2026

Can password managers get hacked? Here’s what to know

November 14, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.