Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Fake AWS Packages Disguise Malware in JPEG Files
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Fake AWS Packages Disguise Malware in JPEG Files
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Fake AWS Packages Disguise Malware in JPEG Files

Security

Fake AWS Packages Disguise Malware in JPEG Files

Cybersecurity experts have discovered fake AWS packages on the npm registry that hide sophisticated malware within JPEG files.

Marco Rizal
Last updated: August 21, 2024 9:57 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Fake AWS Packages Disguise Malware in JPEG Files
SHARE

On July 13, 2024, security company, Phylum has been alerted of a suspicious packages on the npm package registry.

Despite their initial appearance of legitimacy, these packages actually contained highly advanced malware concealed within image files, which posed a significant threat to users.

There were two fake packages discovered in this campaign, with one of them being called “img-aws-s3-object-multipart-copy.”

This package is a replica of a library called “aws-s3-object-multipart-copy” from GitHub. Nevertheless, the counterfeit package contained an additional script called “loadformat.js” which executed malicious code while being installed.

The script in the counterfeit package appeared to analyze image files, but it was actually reading each byte of the images, converting them into characters, and storing them in a variable named “analyzepixels.”

image 28
Credits: Phylum

If the length of these bytes exceeded 2,000, a variable named “convertertree” would be set to true. The hidden commands extracted from the image files were executed as a result.

Command-and-Control Hidden in JPEGs

In the package's root directory, three image files were discovered: logo1.jpg, logo2.jpg, and logo3.jpg.

The malware was triggered by the data contained in the Microsoft logo image (logo2.jpg). The Microsoft logo contained a harmful code that was designed to regularly connect to a remote server (85.208.108.29) and carry out specific commands.

image 26
Logo2.jpg in the package (Credits: Phylum)

The script first registers the infected machine with the server by sending its hostname and operating system details.

After a short interval, it continuously seeks fresh instructions from the person initiating the attack.

These commands have the ability to modify directories, adjust update intervals, or execute any code provided by the attacker. The results of these commands are then transmitted back to the attacker's server.

This method is not a new discovery, in May 2024, the technique of concealing harmful code within images was observed in PyPI packages.

Nevertheless, the individuals responsible for these npm packages possess considerable expertise and harbor malicious motives.

The malicious version of “img-aws-s3-object-multipart-copy” adds a code to the “index.js” file, which is otherwise legitimate. This code addition is responsible for running the “loadformat.js” script, which contains the hidden malware.

The malicious packages were accessible on npm for almost two days before they were reported and taken down.

More Stories

Hacker Leaks 3.3 Billion Emails and Yes Every Single One Is Unique

Deepfakes, Hacks, and Leaks Threaten to Disrupt 2024 US Election

Credit Suisse Data Breach: Sensitive Information for Sale on Dark Web

Smishing Scams Rise As Election Day Approaches

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Smishing Campaigns Continue to Target Apple IDs

Smishing Campaigns Continue to Target Apple IDs

Windows Users Hit by New Malware Disguised as Purchase Orders

Windows Users Hit by New Malware Disguised as Purchase Orders

Casio Suspends Repair Services After Major Cyberattack Disrupts Systems

Casio Suspends Repair Services After Major Cyberattack Disrupts Systems

Largest FIN7 Malware Campaign Targets Global Companies Across 4000 Domains

Largest FIN7 Malware Campaign Targets Global Companies Across 4000 Domains

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?