Connect with us

Evil counterparts of NPM package noblox.js attack Roblox fans



Someone regularly creates malicious copies of the noblox.js package and gives them names that are very similar to the real one.

Since the beginning of September this year, Josh Muir, along with five other developers of the noblox.js package, has been trying hard to prevent cybercriminals from spreading ransomware through malicious libraries with similar names.

Noblox.js is a Roblox API wrapper that allows players to automate interactions on the popular Roblox gaming platform. However, in recent months, someone has been regularly creating malicious copies of the package and giving them names that are very similar to the real one.

Attackers use the so-called typesquatting – they come up with names that differ from the original by one or two characters, and hope for the inattention of potential victims. The malicious packages are uploaded to NPM (an open source JavaScript library repository), and then the files infected by them are distributed through Discord.

Last month, specialists from the information security company Sontatype reported on the malicious “counterparts” of noblox.js. According to them, there is no question of an attack on the supply chain in this case, and the malicious packages were created for fun. Muir, however, disagrees.

“I know Sonatype described this attack as a likely ‘joke’, but I assure you, this is not a joke, but a sustained and ongoing attack on our library and its users,” Muir told The Register.

The developer is aware of the existence of six malicious “twins” of the noblox.js library: noblox.js-rpc, noblox.js-proxy, noblox.js-beta, noblox.js-promise, noblox.js-promises, and discord.buttons-js. They have all been removed by now.

Sonatype Senior Security Researcher Ax Sharma confirmed to The Register that the company continues to capture more and more malicious NPM packages, including those with names similar to noblox.js. The last package uploaded was noblox.js-rpc, and was authored by the same person who previously uploaded the “evil counterparts” of noblox.js to NPM, which distributed ransomware. The same person runs the Discord server to exchange information about infected repositories and receive a ransom from the victims.

Muir is particularly concerned about the fact that most of the users downloading these malicious packages are children. Attackers distribute malware by registering on Discord servers where very young players “sit” (some are under 13) and rubbing their trust.

According to the developer, he has reason to believe that at least one minor was blackmailed using files stolen from him (the Discord administration was notified of this). And if NPM reacts to reports of malicious libraries and removes them, Discord doesn’t show much responsibility. As Muir explained, if an attacker deleted his original message, then bribes are smooth from him. If he regularly deletes his posts or uses alternative accounts, then Discord will not catch him.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *


Instagram said it is strengthening the protection of its underage users



The head of Instagram is due to speak at a hearing in the US Congress on December 7 and talk about the measures taken by his service to protect children.

Tuesday, December 7th, Instagram administration stated the intention to carefully select the content recommended for teens and to nudge them to other areas if they get hung up on one thing. On its blog, the service announced a few more changes that will affect teenagers.

Instagram chief Adam Mosseri is due to speak at a hearing in the US Congress on Wednesday, December 7, and talk about the measures taken by his service to protect children online.

Recently, Instagram and parent company Meta Platforms (formerly Facebook) have come under fire for the potential harm to the mental health and safety of children online.

According to Mosseri, Instagram will disable the ability for users to tag or mention teenagers who are not their followers. Starting in January 2022, teenagers will have the opportunity to massively delete their content, previously set “likes” and written comments.

The service looked at control tools to limit potentially harmful or sensitive content to teens through search, hashtags, short videos (Reels) and featured pages, Mosseri said.

Instagram is also launching a Take a Break feature for users in the US, UK, Canada and Australia, which will remind users to distract themselves if the user is stuck in the app for a long time.

In March 2022, Instagram will launch its first parental control tool that will allow parents and guardians to see how much time a teen is spending on the app.

In September of this year, the Instagram administration decided to postpone the launch of the version of the application for children for now, and now the press service of the service has confirmed that the Instagram management does not intend to return to this project yet.

Continue Reading


Israeli authorities strengthen oversight of cyber technology exports



The move follows a series of scandals involving Israeli spyware developer NSO Group.

Israel’s Defense Export Control Agency has decided to tighten oversight over the export of offensive cyber products. Companies buying Israeli cyber technologies will have to sign a declaration to use the products “only for the investigation and prevention of terrorist attacks and serious crimes.” Countries that violate the terms of use may be subject to sanctions, “including restricting and / or shutting down the cyber system.”

As the Associated Press reported, the decision was made just days after another NSO Group spyware scandal. US diplomats in Uganda have been targeted by a software tool developed by the NSO Group. Spyware, developed by the Israeli company NSO Group, has been used to hack iPhone smartphones by at least nine US foreign policy officials.

The NSO Group has faced a flood of international criticism over accusations that it helps governments spy on political opponents and human rights defenders. However, according to the company itself, its product is intended solely to help countries in the fight against crime and terrorism. Israel’s Defense Ministry has also drastically reduced the list of countries to which Israeli companies are allowed to sell their cyber technology. If earlier the list included 102 countries, now it has been reduced to 37. In particular, Israel’s new allies Morocco and the United Arab Emirates, in which cases of human rights violations are known, were excluded from it.

Continue Reading


Life360 service is suspected of selling geodata of children to third parties



The company is one of the largest providers of confidential information on the personal data market.

Specialists of the non-profit organization The Markup spent investigation into the service Life360, which allows tracking the geolocation of children. As it turned out, the company is one of the largest providers of confidential information in the personal data market.

The Markup contacted two former employees of the so-called “data brokers” Cuebiq and X-Mode. Life360 made about $ 16 million in 2020 from selling user data to dozens of different companies, according to whistleblowers. In addition, two former Life360 employees also told the organization about the company’s additional source of income.

According to a former X-Mode employee, the raw location data from Life360 was one of the most valuable offerings on the market due to the sheer volume and accuracy of the data. A former Cuebiq employee joked that the company would not be able to carry out its marketing campaigns without the constant stream of location data from Life360.

The privacy policy of the application specifies the transfer of personal data, but the wording of the document actually allows the company to “transfer information to third parties in a form that allows you to identify the user.”

The functionality of the service allows you to prohibit the transfer of data, but this is not directly communicated to the user. This function is hidden in several sub-items of the settings, and consent to the use of information for commercial purposes is activated by default.

Whistleblowers said the company did not maintain adequate user anonymity and only removed names or home addresses prior to the sale. The rest of the information made it possible to easily identify the identity of the user. Any organization could become a buyer of data from Life360; the company did not enter into transactions only with government agencies.

The founder of the company, Chris Hulls (Chris Hulls) was unable to confirm or deny the results of the investigation.

Continue Reading

Most Popular