A recent cybersecurity campaign has targeted the npm package repository with malicious JavaScript libraries designed to infect Roblox users with data-stealing malware. The rogue packages, such as “node-dlls” and “rolimons-api,” masqueraded as legitimate libraries, exploiting developers’ trust. These malicious packages were designed to be downloaded and executed, secretly deploying two types of stealer malware—Skuld, written in Go, and Blank-Grabber, written in Python. Once the malware is activated, it collects sensitive information from the infected systems and sends it back to the attacker via Discord webhook or Telegram.
The attack highlights the risks inherent in the open-source ecosystem, where developers increasingly rely on shared code. By leveraging familiar package names, threat actors can deceive unsuspecting users into downloading malicious code. The targeted nature of these packages indicates a deeper understanding of Roblox’s popularity among developers, which makes the platform an attractive target for cybercriminals. The names of some malicious packages, like “rolimons-api,” were designed to impersonate trusted resources, further complicating the identification of the threat.
The malware itself is retrieved from a GitHub repository controlled by the attackers, and once deployed, it uses sophisticated techniques to exfiltrate data from compromised systems. The Skuld and Blank-Grabber malware families can harvest a wide range of sensitive information, including login credentials, personal data, and more, giving the attackers full access to the victim’s data. This exploitation of trust, combined with the use of Discord and Telegram for command and control operations, allows the attackers to bypass many traditional security measures, further highlighting the vulnerabilities in the open-source software development lifecycle.
To mitigate the risk of such attacks, developers are urged to be more vigilant when downloading packages from public repositories. They should carefully verify package names and scrutinize the source code to ensure it aligns with expected functionality. This incident underscores the need for heightened awareness and more robust security practices within the open-source ecosystem. As cybercriminals continue to exploit trust and human error, it is critical for developers to remain vigilant in order to prevent similar attacks from succeeding in the future.