15+ NPM Packages Exploiting Windows Systems to Distribute Vidar Malware

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Emergence of a Sophisticated Supply-Chain Attack

A sophisticated supply-chain offensive has surfaced, specifically targeting Windows systems via compromised npm packages—a notable vulnerability within the realm of open-source software dissemination.

Between October 21 and 26, 2025, threat actors disseminated 17 malicious npm packages encompassing 23 distinct releases engineered to propagate Vidar infostealer malware.

This campaign capitalized on the inherent trust developers place in package registries, cleverly masquerading as benign packages, including Telegram bot helpers, icon libraries, and forks of well-known projects such as Cursor and React.

The attack was conducted through two newly established npm accounts, aartje and saliii229911, which published packages that were downloaded more than 2,240 times prior to their removal from the registry.

This distribution technique signifies a transformative approach for Vidar, which has historically been disseminated via phishing emails with malicious Office documents.

The duplicitous packaging and ostensibly legitimate functionalities facilitated the widespread propagation of malicious code before timely detection could occur. The package custom-tg-bot-plan presents as a legitimate SDK on its npm page.

Security researchers at Datadog Security Labs identified the campaign through their GuardDog static analyzer, which flagged numerous suspicious indicators, including post-install script execution and process spawning activities.

This investigation revealed that all packages executed identical attack chains via postinstall scripts; certain variants employed PowerShell commands embedded directly within package.json files.

Infection Mechanism and Technical Breakdown

The attack exhibits a remarkable simplicity in its execution. Upon installation of the compromised packages, post-installation scripts were automatically triggered, downloading an encrypted ZIP archive from the bullethost.cloud infrastructure.

Downloader scripts utilized hardcoded credentials to extract the archive, appropriating bridle.exe, a previously unseen Go-compiled variant of Vidar within npm distributions.

Once executed with system privileges, the malware initiated its data exfiltration process.

This Vidar variant is adept at gathering sensitive information, including browser credentials, cookies, cryptocurrency wallets, and system files, subsequently exfiltrating the pilfered data through command-and-control (C2) channels.

The malware identifies active C2 servers by probing hardcoded Telegram and Steam throwaway accounts that house regularly updated C2 domains.

Subsequent to successful data exfiltration, the malware meticulously purges traces of its activities, complicating post-compromise detection efforts.

Hackers Use Covert Malware to Access Admin Controls on WordPress Websites

This campaign exemplifies a sophisticated understanding of vulnerabilities inherent in the npm ecosystem.

Threat actors oscillated between multiple C2 domains and employed variations in post-install script implementations, presumably to obscure detection by pattern-based systems.

All affected packages remained operational on npm for roughly two weeks, marking this as one of the most significant npm-based malware campaigns targeting both enterprise development environments and individual developers globally.

Source link: Cybersecuritynews.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading