Thanks a lot for investigating this further. I'll write a cleaner blog post to alert other potential victims. From the package downloads they're hacking around 200 people per week, just with `json-mappings`. I've definitely would have fallen myself if it wasn't for the few red flags they didn't even try to avoid.
uyzstvqs|2 months ago
Their C2 is 144.172.115[.]116 (RouterHosting LLC / Cloudzy in Utah, USA) on ports 8085-8087 over HTTP and WebSockets.
Relevant: https://www.securityweek.com/iran-run-isp-cloudzy-caught-sup...
> I've definitely would have fallen myself if it wasn't for the few red flags they didn't even try to avoid.
Always use a VM for this kind of stuff, even if you're interviewing at Google. More advanced threat actors could also fake Github stars or NPM downloads, or even use a hijacked dependency that used to be legitimate.
reliefcrew|2 months ago
Just theorizing.