{"id":12055,"date":"2026-02-22T13:58:38","date_gmt":"2026-02-22T13:58:38","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=12055"},"modified":"2026-02-22T13:58:39","modified_gmt":"2026-02-22T13:58:39","slug":"hackers-conceal-pulsar-rat-inside-png-pictures-in-new-npm-provide-chain-assault","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=12055","title":{"rendered":"Hackers Conceal Pulsar RAT Inside PNG Pictures in New NPM Provide Chain Assault"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>A brand new sort of cyberattack has been found that makes use of odd photographs to cover a harmful virus. Consultants at Veracode Menace Analysis discovered a malicious package deal on NPM, which is an enormous web site utilized by thousands and thousands of software program builders to share instruments. The package deal was designed to seem like a traditional piece of software program, however its actual purpose was to take over an individual\u2019s laptop.<\/p>\n<p>The package deal was named <strong><code>buildrunner-dev<\/code><\/strong>. That is the place the trick lies, because the hackers used a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/npm-typosquatting-attack-deliver-r77-rootkit\/\" target=\"_blank\" data-type=\"post\" data-id=\"100472\" rel=\"noreferrer noopener\"><strong>typosquatting approach<\/strong><\/a> the place they gave it a reputation that&#8217;s nearly the identical as an actual, secure software known as buildrunner, hoping somebody would make a spelling mistake and obtain it by chance. This reveals that the assault begins the second the software program is put in.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/Malicious-NPM-Package-Found-Hiding-Pulsar-Malware-in-Simple-Image-Files.png\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"224\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/Malicious-NPM-Package-Found-Hiding-Pulsar-Malware-in-Simple-Image-Files.png\" alt=\"\" class=\"wp-image-141629\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/Malicious-NPM-Package-Found-Hiding-Pulsar-Malware-in-Simple-Image-Files.png 640w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/Malicious-NPM-Package-Found-Hiding-Pulsar-Malware-in-Simple-Image-Files-300x105.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/Malicious-NPM-Package-Found-Hiding-Pulsar-Malware-in-Simple-Image-Files-380x133.png 380w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\"\/><\/a><figcaption class=\"wp-element-caption\">The malicious package deal (Supply: Veracode)<\/figcaption><\/figure>\n<\/div>\n<h3 id=\"a-very-messy-distraction\" class=\"wp-block-heading\"><strong>A Very Messy Distraction<\/strong><\/h3>\n<p>As soon as the package deal is on a pc, it runs a script that downloads a file known as packageloader.bat. On your data, this file is big and really complicated. It has over 1,600 strains of textual content, however most of it&#8217;s simply \u201cnoise\u201d to cover the virus from safety scanners, Veracode researchers defined within the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.veracode.com\/blog\/malicious-npm-package-hiding-in-plain-pixels\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>weblog publish<\/strong><\/a> shared solely with Hackread.com.<\/p>\n<p>In accordance with researchers, the file is filled with random phrases like \u201craven,\u201d \u201cglacier,\u201d and \u201cmonsoon\u201d that don\u2019t really do something. Out of the entire file, solely about 21 strains are actual instructions. Additional probing revealed that the malware can be fairly sensible; it checks to see when you have antivirus packages like ESET, Malwarebytes, or F-Safe.<\/p>\n<p>If it finds them, it makes use of totally different tips to sneak previous them with out setting off any alarms. It first copies itself to a hidden folder as shield.bat so it may keep on the pc. It then checks if it has \u201cAdmin\u201d rights. If it doesn\u2019t, it makes use of a Home windows software known as <code><strong>fodhelper.exe<\/strong><\/code> to bypass safety warnings, so the person by no means sees a pop-up asking for permission.<\/p>\n<h3 id=\"hiding-inside-an-image\" class=\"wp-block-heading\"><strong>Hiding Inside an Picture<\/strong><\/h3>\n<p>Essentially the most fascinating a part of this assault is the way it hides the precise virus inside a picture. That is known as <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/your-shipment-notification-malware-dropper\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>steganography<\/strong><\/a>. The malware downloads a <strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/malicious-vs-code-extensions-trojan-fake-png-files\/\" data-type=\"post\" data-id=\"138435\" target=\"_blank\" rel=\"noreferrer noopener\">PNG picture<\/a><\/strong> from a free internet hosting web site, which, to a traditional particular person, simply appears like fuzzy, grainy \u201cnoise.\u201d Nevertheless, the malware is programmed to learn the tiny bits of color information, often known as RGB pixel values, to search out hidden code.<\/p>\n<p>Additionally, researchers discovered that the malware makes use of a trick known as course of hollowing, the place it replaces the \u201cinsides\u201d of a secure program with malicious code to seem like a traditional course of. It then installs a last malware known as <strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/windows-malware-pulsar-rat-live-chats-steal-data\/\" target=\"_blank\" data-type=\"post\" data-id=\"140892\" rel=\"noreferrer noopener\">Pulsar RAT<\/a><\/strong>. <\/p>\n<p>Pulsar is a Distant Entry Trojan that provides hackers full management of the pc. The hackers used unusual names like <code><strong>CheaperMyanmarCaribbean.exe<\/strong><\/code> to maintain the virus hidden within the laptop\u2019s reminiscence. Whereas this was present in a software for tech specialists on NPM, it reveals that even a easy picture file can be utilized to cover a serious risk.<\/p>\n<p>\n\t\t\t<\/div>\n<p><template id="b0u3noJTvfpzsbacRDz3"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A brand new sort of cyberattack has been found that makes use of odd photographs to cover a harmful virus. Consultants at Veracode Menace Analysis discovered a malicious package deal on NPM, which is an enormous web site utilized by thousands and thousands of software program builders to share instruments. The package deal was designed [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12057,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[717,241,554,2905,130,1116,7940,7655,1538,240],"class_list":["post-12055","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-attack","tag-chain","tag-hackers","tag-hide","tag-images","tag-npm","tag-png","tag-pulsar","tag-rat","tag-supply"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12055"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12055\/revisions"}],"predecessor-version":[{"id":12056,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12055\/revisions\/12056"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/12057"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-11 03:08:34 UTC -->