Malicious Packages Identified in the Wild: Insights and Trends from November 2024 Onward

March 11, 2025, 12:03 p.m.

Description

FortiGuard Labs has analyzed malicious software packages detected from November 2024 to March 2025, revealing various attack techniques used to exploit system vulnerabilities. Key findings include 1,082 packages with low file counts, 1,052 packages with suspicious install scripts, and 1,043 packages lacking repository URLs. Attackers employ methods such as obfuscation, command overwrite, and typosquatting to bypass security measures. The analysis highlights the use of suspicious APIs, URLs, and installation scripts to exfiltrate data, establish backdoors, and perform remote control activities. Specific cases involve malicious Python and Node.js packages targeting developers and harvesting sensitive information. The report emphasizes the importance of robust detection strategies and proactive defense measures to mitigate these evolving cybersecurity threats.

Date

  • Created: March 10, 2025, 8:29 p.m.
  • Published: March 10, 2025, 8:29 p.m.
  • Modified: March 11, 2025, 12:03 p.m.

Indicators

  • ba0ac1985fb931110899402ce44f11c5d75161cb69ff3d0e9357000ef631a2e1
  • a7ba9a1eef84ae8dad8ed328c41fe4346df402a003ff7cef5e7cbd592c29f4de
  • 973a87cc0baa17c53a17467e188d82241458f7ff1e70e920014eaf2bacbe3a07
  • 920da0917dbf7ead5531406b324de83656c90a39176f5377c123fe36d257668b
  • 8fe3eee65782c61111354a0a2a58da04901c7b416d3b7634aa605e1939dde531
  • 6a68848e118ec280d01a1dc989e8d67ca10b3f14aab98eb87a23b340c863fdcf
  • 673db52c28aac71f8cf80ee1718b8ea98e1f8e0b3f1293da15fd26c4e6343927
  • 3fe14fc83121fdc05efdcc0c1c4d532ca501644a952399b27a6e1bdd6cfed2b7
  • 351bd6e977884f050bdb348239cfd20e0cc9b9a7a6aa3b3aa21e3bed0b072afe
  • 2420fa98a183da4153e4de00e401efa19c62fe9ed631d980315b0b719221aec4
  • 05e9226714f29fbe526820d35c8011f86297444ec581d16d60b38bb55b20fa91

Attack Patterns

  • T1571
  • T1105
  • T1102
  • T1055
  • T1036
  • T1204
  • T1140
  • T1132
  • T1027
  • T1059