Exclusive Webinar Alert! : Defending Against Sophisticated Threats in the Digital Economy Register Now

×

#1 Trending Cybersecurity News & Magazine

Wednesday, May 21, 2025
The Cyber Express
No Result
View All Result
Free Newsletter
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Russian GRU Hackers, Logistics, IP Cameras, Cyber Espionage, Cyber espionage, Russia Ukraine, Cyberwarfare, U.S., Western Allies

    Russian GRU Is Hacking IP Cameras and Logistics Firms to Spy on Aid Deliveries from Western Allies to Ukraine

    dMSA attack flow

    Active Directory dMSA Privilege Escalation Attack Detailed by Researchers

    Kettering Health Cyberattack

    Kettering Health Hit by Cyberattack: Network Outage and Scam Calls Reported

    e-Zero FIR

    India Launches e-Zero FIR System to Fast-Track Financial Cybercrime Cases

    Multer Vulnerabilities

    Millions of Node.js Apps at Risk Due to Critical Multer Vulnerabilities

    Dutch Espionage Law Update 2025

    Dutch Espionage Law Update 2025: Cyber Offenses Now Punishable by Up to 12 Years

    vulnerability exploit exploitation likelihood

    CISA, NIST Researchers Develop Metric to Determine Likelihood of Vulnerability Exploitation

    Peter Green Chilled Cyberattack

    Peter Green Chilled Cyberattack Disrupts Supermarket Supply Chain Across the UK

    23andMe

    After Bankruptcy, 23andMe Finds a Buyer in Regeneron—But What Happens to Your Data?

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Russian GRU Hackers, Logistics, IP Cameras, Cyber Espionage, Cyber espionage, Russia Ukraine, Cyberwarfare, U.S., Western Allies

    Russian GRU Is Hacking IP Cameras and Logistics Firms to Spy on Aid Deliveries from Western Allies to Ukraine

    Dutch Espionage Law Update 2025

    Dutch Espionage Law Update 2025: Cyber Offenses Now Punishable by Up to 12 Years

    FBI Warns Scams

    FBI Warns of AI Voice Scam: Smishing & Vishing Campaign Targets US Officials

    India Pakistan Cyberspace

    No Ceasefire in the Cyberspace Between India and Pakistan

    Australia, Data breaches, OAIC, Information Commissioner, Data Breach

    Australia’s Data Breach Reporting Numbers Highest in Half a Decade

    Marbled Dust, Turkey, Hackers, Microsoft Threat Intelligence,

    Türkiye-linked Hackers Exploit Output Messenger Zero-Day in Targeted Espionage Campaign

    Indo-Pak War, Hacktivist groups, Hacktivist, Cyberattack, Cyberwarfare,

    Post Pahalgam, Over 40 Hacktivist Groups Targeted India: High Noise, Low Impact

    Digital Blackout, Blackout, India, Pakistan

    At a Time of Indo-Pak Conflict, Why a Digital Blackout Matters—and How to Do It

    Europol Scams

    Europol Issues Public Alert: ‘We Will Never Call You’ as Phone and App Scams Surge

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

    Streaming Platforms

    Protect Your Streaming Accounts Now Before It’s Too Late

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    23andMe

    After Bankruptcy, 23andMe Finds a Buyer in Regeneron—But What Happens to Your Data?

    Australia, Data breaches, OAIC, Information Commissioner, Data Breach

    Australia’s Data Breach Reporting Numbers Highest in Half a Decade

    Sam Altman

    Sam Altman Says AI Privacy Concerns Are Real — But Early Regulation Could Hurt Innovation

    AI CIO Playbook 2025

    Governance First, GenAI Next: How Indian CIOs Are Prioritizing AI

    Oracle, Oracle Singapore, Singapore, Oracle Singapore Partnership,

    Singapore Inks Deal with Oracle for “Isolated” Cloud Computing and AI Services

    Wiz acquisition

    Will Wiz Finally Sell? Alphabet Increases Offer to $30 Billion in Renewed Talks

    Globee Cybersecurity Awards 2025

    Cyble Secures Prestigious Recognition with Four Silver Wins at the Globee Cybersecurity Awards 2025

    E-Wallets

    7 Tools to Prevent Breaches in E-Wallets and Crypto Wallets

    Archana Venugopal

    Archana Venugopal Takes Charge as Senior VP & CISO at National Commodity Exchange

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Russian GRU Hackers, Logistics, IP Cameras, Cyber Espionage, Cyber espionage, Russia Ukraine, Cyberwarfare, U.S., Western Allies

    Russian GRU Is Hacking IP Cameras and Logistics Firms to Spy on Aid Deliveries from Western Allies to Ukraine

    dMSA attack flow

    Active Directory dMSA Privilege Escalation Attack Detailed by Researchers

    Kettering Health Cyberattack

    Kettering Health Hit by Cyberattack: Network Outage and Scam Calls Reported

    e-Zero FIR

    India Launches e-Zero FIR System to Fast-Track Financial Cybercrime Cases

    Multer Vulnerabilities

    Millions of Node.js Apps at Risk Due to Critical Multer Vulnerabilities

    Dutch Espionage Law Update 2025

    Dutch Espionage Law Update 2025: Cyber Offenses Now Punishable by Up to 12 Years

    vulnerability exploit exploitation likelihood

    CISA, NIST Researchers Develop Metric to Determine Likelihood of Vulnerability Exploitation

    Peter Green Chilled Cyberattack

    Peter Green Chilled Cyberattack Disrupts Supermarket Supply Chain Across the UK

    23andMe

    After Bankruptcy, 23andMe Finds a Buyer in Regeneron—But What Happens to Your Data?

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Russian GRU Hackers, Logistics, IP Cameras, Cyber Espionage, Cyber espionage, Russia Ukraine, Cyberwarfare, U.S., Western Allies

    Russian GRU Is Hacking IP Cameras and Logistics Firms to Spy on Aid Deliveries from Western Allies to Ukraine

    Dutch Espionage Law Update 2025

    Dutch Espionage Law Update 2025: Cyber Offenses Now Punishable by Up to 12 Years

    FBI Warns Scams

    FBI Warns of AI Voice Scam: Smishing & Vishing Campaign Targets US Officials

    India Pakistan Cyberspace

    No Ceasefire in the Cyberspace Between India and Pakistan

    Australia, Data breaches, OAIC, Information Commissioner, Data Breach

    Australia’s Data Breach Reporting Numbers Highest in Half a Decade

    Marbled Dust, Turkey, Hackers, Microsoft Threat Intelligence,

    Türkiye-linked Hackers Exploit Output Messenger Zero-Day in Targeted Espionage Campaign

    Indo-Pak War, Hacktivist groups, Hacktivist, Cyberattack, Cyberwarfare,

    Post Pahalgam, Over 40 Hacktivist Groups Targeted India: High Noise, Low Impact

    Digital Blackout, Blackout, India, Pakistan

    At a Time of Indo-Pak Conflict, Why a Digital Blackout Matters—and How to Do It

    Europol Scams

    Europol Issues Public Alert: ‘We Will Never Call You’ as Phone and App Scams Surge

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

    Streaming Platforms

    Protect Your Streaming Accounts Now Before It’s Too Late

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    23andMe

    After Bankruptcy, 23andMe Finds a Buyer in Regeneron—But What Happens to Your Data?

    Australia, Data breaches, OAIC, Information Commissioner, Data Breach

    Australia’s Data Breach Reporting Numbers Highest in Half a Decade

    Sam Altman

    Sam Altman Says AI Privacy Concerns Are Real — But Early Regulation Could Hurt Innovation

    AI CIO Playbook 2025

    Governance First, GenAI Next: How Indian CIOs Are Prioritizing AI

    Oracle, Oracle Singapore, Singapore, Oracle Singapore Partnership,

    Singapore Inks Deal with Oracle for “Isolated” Cloud Computing and AI Services

    Wiz acquisition

    Will Wiz Finally Sell? Alphabet Increases Offer to $30 Billion in Renewed Talks

    Globee Cybersecurity Awards 2025

    Cyble Secures Prestigious Recognition with Four Silver Wins at the Globee Cybersecurity Awards 2025

    E-Wallets

    7 Tools to Prevent Breaches in E-Wallets and Crypto Wallets

    Archana Venugopal

    Archana Venugopal Takes Charge as Senior VP & CISO at National Commodity Exchange

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express by Cyble
No Result
View All Result

jQuery Attack Hits NPM and GitHub; Can Extract Web Form Data

The trojanized jQuery attack has been spread on npm, GitHub and elsewhere since May.

by Paul Shread
July 8, 2024
Reading Time: 3 mins read
jQuery attack
Share on LinkedInShare on Twitter

A trojanized version of jQuery has been spreading on the npm JavaScript package manager, GitHub and elsewhere, for use in a jQuery attack, security researchers have discovered.

Phylum researchers said they have been monitoring the “persistent supply chain attacker” since May 26, initially on npm, “where we saw the compromised version published in dozens of packages over a month. After investigating, we found instances of the trojanized jQuery on other platforms, such as GitHub, and even as a CDN-hosted resource on jsDelivr.”

The malicious packages can extract website form data and send it to one of many URLs. In all, the researchers observed 68 malicious packages across 33 domains, which they listed in a blog post.

Because they contain so much widely used open source code, platforms like npm and GitHub are an attractive place for threat actors to try to distribute malicious code, or to hijack legitimate projects to launch supply chain attacks.

jQuery Attack Shows ‘High Variability’

The researchers said the jQuery attack “is unlike most we’ve seen at this scale, which typically have a clear, well-defined pattern and an obvious automated aspect. Here, the ad-hoc nature and custom variability of the packages, along with the long timeframe over which they were published, suggest that each package was manually assembled and published.”

The published packages were “relatively minimal,” they said, and the attacker included at least one complete copy of jQuery, often named jquery.min.js, along with other variations such as registration.min.js, icon.min.js, and fontawesome.js. The exfiltration URLs were typically unique for each package. The attacker published to npm under new usernames. although a single user would occasionally publish multiple related packages. The attacker occasionally included multiple file versions with different names within the same project.

Your browser does not support the video tag.

“Interestingly, almost every package also contained personal files not typically included in npm publications, such as the npm cache folder, npm logs folder, and a termux.properties file,” the Phylum researchers said.

How the jQuery Attack Works

Each malicious package contained a copy of jQuery with one small difference, the researchers said: the end function, a part of the jQuery prototype, was modified to include additional malicious code.

The attacker “has cleverly hidden the malware in the seldom-used end function of jQuery, which is internally called by the more popular fadeTo function from its animation utilities,” they wrote.

The end method is used to end the most recent filtering operation in the current chain and return the set of matched elements to its previous state. The example of unaltered end method code they provided is pretty simple:

normal jQuery end function
Normal jQuery end function (source: Phylum)

In a malicious example the researchers shared, the code is significantly more complex:

jQuery attack altered end function
jQuery attack altered end function (source: Phylum)

They noted that the attacker is firing off a non-blocking GET request via $.ajax to a remote URL, which includes a query parameter that is constructed by serializing all form data on the page (($(“form”).serialize())) and then encoding it into a hex string.

“This means that if you’re using this trojanized version, all form data on the page is exfiltrated any time the end function is called,” they wrote.

Developers Should Be Cautious with Packages

For the malware to be triggered, the researchers noted that a user must install one of the malicious packages, use the included trojanized jQuery file, and then invoke either the end function or the fadeTo function.

“This specific chain of conditions makes it unclear whether this is a highly targeted attack or if the attacker is simply blending in well and randomly affecting users who download and use these packages,” they said.

“The sheer number of packages, the variability in naming conventions, and the inclusion of personal files within these packages raise questions about the attacker’s capabilities and intentions,” they said. “These factors contrast sharply with the more sophisticated nature of the actual malware itself and the effort taken to conceal its maliciousness in plain sight.

“Despite the narrow set of conditions required to trip the malware, the broad distribution of the packages means the potential impact is wide, potentially affecting many unsuspecting developers. This novel attack exemplifies the rising complexity and potential for the broad reach of supply chain threat actors.”

For developers, supply chain threats like these mean they must be careful to download packages only from trusted sources and to update and patch regularly. Verifying package signatures and using package security tools can also help ensure the security of their projects.

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • More
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on WhatsApp (Opens in new window) WhatsApp

Related

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Paul Shread

Paul Shread

Paul Shread, International Editor for The Cyber Express and Cyble, has covered nearly every aspect of enterprise technology in his 25 years in IT journalism, including award-winning articles on endpoint security and virtual data centers, and a report exposing critical security flaws in a major SIEM system. Publications he has edited and written for include eSecurity Planet, Datamation, eWeek, IT Business Edge, Webopedia, and many more. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst, cybersecurity, and analytics certifications. You can follow him on LinkedIn at: https://www.linkedin.com/in/paul-shread/

Next Post
'Act 33' Pennsylvania Law data breach

New 'Act 33' Pennsylvania Law Mandates Stricter Protection for Victims Of Data Breaches

Your browser does not support the video tag.


Follow Us On Google News

Latest Cyber News

Russian GRU Hackers, Logistics, IP Cameras, Cyber Espionage, Cyber espionage, Russia Ukraine, Cyberwarfare, U.S., Western Allies
Espionage

Russian GRU Is Hacking IP Cameras and Logistics Firms to Spy on Aid Deliveries from Western Allies to Ukraine

May 21, 2025
dMSA attack flow
Cyber News

Active Directory dMSA Privilege Escalation Attack Detailed by Researchers

May 21, 2025
Kettering Health Cyberattack
Cyber News

Kettering Health Hit by Cyberattack: Network Outage and Scam Calls Reported

May 21, 2025
e-Zero FIR
Firewall Daily

India Launches e-Zero FIR System to Fast-Track Financial Cybercrime Cases

May 21, 2025

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information
Facebook Twitter LinkedIn

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

© 2022 - 2025 The Cyber Express by Cyble. All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2022 - 2025 The Cyber Express by Cyble. All Rights Reserved

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information