this post was submitted on 25 Nov 2025
29 points (100.0% liked)

Cybersecurity

8648 readers
113 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] TragicNotCute@lemmy.world 7 points 1 day ago (1 children)

The most alarming evolution in this variant is its aggressive volatility. While the primary goal remains credential theft, the malware includes a destructive fail-safe that triggers if it cannot establish persistence or exfiltrate data.

Certainly as escalation compared to what you normally see in NPM attacks.

[โ€“] thebardingreen@lemmy.starlightkel.xyz 5 points 1 day ago* (last edited 1 day ago)

The NPM ecosystem has been ripe for this kind of invasion over a decade. And I don't want to make generalizations or throw shade at a whole class of people, but over the years I have met a lot of very complacent, very naive about security Node devs (some of whom have gotten very frustrated with me for raising concerns about the ecosystem being a ticking time bomb).

I've been expecting something like this for years.