LofyLife: Campaign distributes infected open source code packages

Kaspersky_news

Share post

Two days ago, on July 26, Kaspersky experts discovered a new malicious campaign called 'LofyLife' using the internal automated system monitoring open source repositories. The public collection of open source code packages is thus compromised.

The campaign uses four malicious packages that proliferate 'Volt Stealer' and 'Lofy Stealer' malware in the open-source npm repository. They collect various information from their victims, including Discord tokens and credit card information, and spy on them over time.

Infected open source code packages

The npm repository is a public collection of open-source code packages that are widely used in front-end web apps, mobile apps, robots, and routers, and also fulfill myriad needs from the JavaScript community. The popularity of this repository makes LofyLife campaign even more dangerous as it could potentially affect numerous users of the repository.

The identified malicious repositories appeared to be packages used for common tasks like formatting headlines or certain game features. However, they contained heavily obfuscated malicious JavaScript and Python code. This made it difficult to analyze when uploading to the repository. The malicious payload consisted of the Volt Stealer malware, written in Python, and the Lofy Stealer JavaScript malware, which has many features.

Wanted: Discord tokens and credit card details

Volt Stealer was used to steal Discord tokens and victims' IP addresses from infected computers and upload them via HTTP. A new development by the attackers, the Lofy stealer can infect Discord client files and monitor the victim's actions. The malware detects when a user logs in, changes email or password details, enables or disables multi-factor authentication, and adds new payment methods, including full credit card details. The information collected is also uploaded to the remote endpoint.

Leonid Bezvershenko, security researcher in Kaspersky's global research and analysis team (GReAT) comments on the detected campaign as follows:

“Developers rely heavily on open source code repositories - they use them to make IT solution development faster and more efficient. Overall, they make a significant contribution to the development of the IT industry. However, as the LofyLife campaign shows, even reputable repositories cannot be trusted by default – any code that a developer puts into their products, including open-source code, is their own responsibility. We have added identifiers of this malware to our products so that users using our solutions can determine if they have been infected and remove the malware.” Kaspersky products detect LofyLife malware as Trojan.Python.Lofy.a, Trojan .Script.Lofy.gen.

More at Kaspersky.com

 


About Kaspersky

Kaspersky is an international cybersecurity company founded in 1997. Kaspersky's in-depth threat intelligence and security expertise serve as the basis for innovative security solutions and services to protect companies, critical infrastructures, governments and private users worldwide. The company's comprehensive security portfolio includes leading endpoint protection as well as a range of specialized security solutions and services to defend against complex and evolving cyber threats. Kaspersky technologies protect over 400 million users and 250.000 corporate customers. More information about Kaspersky can be found at www.kaspersky.com/


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more