By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems
Computing

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

News Room
Last updated: 2025/04/19 at 12:24 PM
News Room Published 19 April 2025
Share
SHARE

Apr 19, 2025Ravie LakshmananLinux / Malware

Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as a popular Telegram bot library but harbor SSH backdoors and data exfiltration capabilities.

The packages in question are listed below –

Cybersecurity

According to supply chain security firm Socket, the packages are designed to mimic node-telegram-bot-api, a popular Node.js Telegram Bot API with over 100,000 weekly downloads. The three libraries are still available for download.

“While that number may sound modest, it only takes a single compromised environment to pave the way for wide-scale infiltration or unauthorized data access,” security researcher Kush Pandya said.

“Supply chain security incidents repeatedly show that even a handful of installs can have catastrophic repercussions, especially when attackers gain direct access to developer systems or production servers.”

The rogue packages not only replicate the description of the legitimate library, but also leverage a technique called starjacking in a bid to elevate the authenticity and trick unsuspecting developers into downloading them.

Starjacking refers to an approach where an open-source package is made to be more popular than it is by linking the GitHub repository associated with the legitimate library. This typically takes advantage of the non-existing validation of the relation between the package and the GitHub repository.

SSH Backdoors on Linux Systems

Socket’s analysis found that the packages are designed to explicitly work on Linux systems, adding two SSH keys to the “~/.ssh/authorized_keys” file, thus granting the attackers persistent remote access to the host.

The script is designed to collect the system username and the external IP address by contacting “ipinfo[.]io/ip.” It also beacons out to an external server (“solana.validator[.]blog”) to confirm the infection.

What makes the packages sneaky is that removing them does not completely eliminate the threat, as the inserted SSH keys grant unfettered remote access to the threat actors for subsequent code execution and data exfiltration.

Cybersecurity

The disclosure comes as Socket detailed another malicious package named @naderabdi/merchant-advcash that’s engineered to launch a reverse shell to a remote server while disguising as a Volet (formerly Advcash) integration.

“The package @naderabdi/merchant-advcash contains hardcoded logic that opens a reverse shell to a remote server upon invocation of a payment success handler,” the company said. “It is disguised as a utility for merchants to receive, validate, and manage cryptocurrency or fiat payments.”

“Unlike many malicious packages that execute code during installation or import, this payload is delayed until runtime, specifically, after a successful transaction. This approach may help evade detection, as the malicious code only runs under specific runtime conditions.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Your watchlist is about to get longer: The 10 hottest shows we’re obsessed with this week
Next Article New PR? Humanoid robots in China competed in their first half-marathon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Invest in Scale AI and hires your CEO
Mobile
New Instagram Following Categories Help You Personalize the Algorithm
Computing
Samsung just tipped to show off Project Moohan headset during Galaxy Unpacked in July
News
The internet went down on Thursday: Here’s what we know now
News

You Might also Like

Computing

New Instagram Following Categories Help You Personalize the Algorithm

6 Min Read
Computing

Top 10 CRM for Marketing Agencies to Boost Growth in 2025

37 Min Read
Computing

The Role of AI in Education

9 Min Read
Computing

You Don’t Need an Extraordinary Life to Write Compellingly | HackerNoon

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?