MALICIOUS (1) campaign cataloged at 2025-01-10(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2025-01-javascan¶
During installation, a code is downloaded and executed. This remote script then attempts to exfiltrate environmental variables, SSH keys, Slack secrets etc.
Abuse categories¶
dependency-confusion
Campaign uses dependency-confusion.
exfiltration_env_variables
Campaign uses exfiltration_env_variables.
exfiltration_ssh_keys
Campaign uses exfiltration_ssh_keys.
files_exfiltration
Campaign uses files_exfiltration.
remote_script
Downloads and executes a remote malicious script.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://slack-dw-javabackend-109783.s3.us-west-1.amazonaws.com/packages/package.json
-
slack-dw-javabackend-109783.s3.us-west-1.amazonaws.com