malicious-npm-package-leverages-unicode-steganography,-google-calendar-as-c2-dropper

Cybersecurity analysts have uncovered a fraudulent package titled “os-info-checker-es6” that masquerades as a utility for operating system information, enabling it to covertly deploy a subsequent payload onto affected systems.
“This initiative employs sophisticated Unicode-based steganography to conceal its initial harmful code and makes use of a Google Calendar event short link as a dynamic delivery mechanism for its ultimate”


Leave a Reply

Your email address will not be published. Required fields are marked *

Share This