New NPM Attack Uses Steganography to Deliver Pulsar RAT

Article Highlights
Off On

A single command executed in a terminal can bridge the gap between a productive afternoon and a total corporate security collapse, especially when the malicious actor is hiding in plain sight. The simple command npm install is a routine part of a developer’s workflow, yet it has become a primary gateway for sophisticated supply chain compromises. A newly discovered malicious package, “buildrunner-dev,” demonstrates how attackers are moving beyond simple script injection to hide entire malware infrastructures within the tools meant to streamline development.

By exploiting the inherent trust in open-source ecosystems, this campaign turns a developer’s productivity against their own system’s security. The package mimics legitimate utilities to ensure it remains unnoticed during initial inspection. Once integrated into a project, it creates a silent foothold that provides attackers with persistent access to sensitive corporate environments.

The Growing Fragility of Open-Source Trust

Supply chain attacks are no longer a theoretical threat; they are a persistent reality for any organization relying on third-party repositories. The “buildrunner-dev” incident highlights a critical trend involving the weaponization of abandoned or legitimate-sounding package names through typosquatting. This technique relies on human error, targeting developers who might misspell a popular package name or overlook the subtle differences between a verified library and a malicious clone.

As developers rush to meet deadlines, the pressure to deliver functional code often leads to a relaxation of security scrutiny. This environment allows malicious actors to insert their code into the development pipeline, where it can spread horizontally through an organization. The erosion of trust in public registries necessitates a more skeptical approach to dependency management, as a single oversight now carries the risk of compromising an entire network.

Anatomy of the “buildrunner-dev” Infection Chain

The attack begins with a postinstall hook that initiates a multi-stage infection process designed to frustrate security analysts and automated sandboxes alike. Once the package is installed, it fetches a batch script bloated with over 1,600 lines of junk code to mask its true intent. This obfuscation makes manual review tedious, as the functional portion of the script is buried deep within thousands of characters of randomized, non-functional commands. To maintain control, the malware establishes persistence by nesting itself within the Windows Startup folder. It also employs a “fodhelper.exe” exploit to bypass User Account Control, granting the attacker administrative privileges without alerting the user. This level of access allows the malware to modify system settings and prepare the environment for the final, more destructive stage of the operation.

Hiding in Plain Pixels: The Steganographic Payload

At the heart of this campaign is a technique known as steganography, where malicious instructions are hidden within non-executable file formats. The attackers host seemingly harmless PNG images on public hosting services, but these files contain an AMSI bypass and a .NET loader encoded directly into the RGB pixel values. Because these files appear as standard visual data, traditional antivirus scanners often overlook them during routine file inspections. The final payload—the Pulsar Remote Access Trojan—is delivered via process hollowing, a stealthy method that injects the RAT into a legitimate Windows process to evade detection. By residing in the memory of a trusted application, the malware can bypass firewall rules and endpoint detection systems. This sophisticated delivery mechanism ensures that the malicious activity remains hidden from both the user and automated security tools.

Expert Insights on the Evolution of Obfuscation

Security analysts view this campaign as a significant shift in how threat actors bypass perimeter defenses. By merging typosquatting with steganographic delivery, the attackers created a blind spot in standard security stacks. Researchers emphasized that the use of public image-hosting services for command-and-control infrastructure made the traffic look like routine web browsing, further complicating the task of threat hunting.

The evolution of these tactics suggests that attackers are increasingly prioritizing stealth over immediate impact. By staying under the radar for longer periods, they can exfiltrate more data and maintain access to internal systems without triggering alarms. This shift toward long-term persistence requires defenders to adopt more advanced behavioral analysis techniques to identify the subtle signs of a compromised environment.

Strategies for Securing the Development Pipeline

Defending against sophisticated NPM attacks required a layered approach that moved beyond simple signature-based detection. Organizations implemented rigorous audits of all NPM dependencies and considered disabling automatic postinstall scripts for unverified packages. Furthermore, security teams prioritized behavioral monitoring, specifically looking for unusual PowerShell activity, unexpected escalations, and outbound connections to free image-hosting platforms. The implementation of zero-trust principles within the development environment became a necessity to mitigate these risks. By restricting the permissions of build processes and requiring manual approval for new dependencies, companies reduced their attack surface significantly. These proactive measures provided a stronger defense against the evolving landscape of supply chain threats, ensuring that developer productivity did not come at the cost of organizational security.

Explore more

Closing the Feedback Gap Helps Retain Top Talent

The silent departure of a high-performing employee often begins months before any formal resignation is submitted, usually triggered by a persistent lack of meaningful dialogue with their immediate supervisor. This communication breakdown represents a critical vulnerability for modern organizations. When talented individuals perceive that their professional growth and daily contributions are being ignored, the psychological contract between the employer and

Employment Design Becomes a Key Competitive Differentiator

The modern professional landscape has transitioned into a state where organizational agility and the intentional design of the employment experience dictate which firms thrive and which ones merely survive. While many corporations spend significant energy on external market fluctuations, the real battle for stability occurs within the structural walls of the office environment. Disruption has shifted from a temporary inconvenience

How Is AI Shifting From Hype to High-Stakes B2B Execution?

The subtle hum of algorithmic processing has replaced the frantic manual labor that once defined the marketing department, signaling a definitive end to the era of digital experimentation. In the current landscape, the novelty of machine learning has matured into a standard operational requirement, moving beyond the speculative buzzwords that dominated previous years. The marketing industry is no longer occupied

Why B2B Marketers Must Focus on the 95 Percent of Non-Buyers

Most executive suites currently operate under the delusion that capturing a lead is synonymous with creating a customer, yet this narrow fixation systematically ignores the vast ocean of potential revenue waiting just beyond the immediate horizon. This obsession with immediate conversion creates a frantic environment where marketing departments burn through budgets to reach the tiny sliver of the market ready

How Will GitProtect on Microsoft Marketplace Secure DevOps?

The modern software development lifecycle has evolved into a delicate architecture where a single compromised repository can effectively paralyze an entire global enterprise overnight. Software engineering is no longer just about writing logic; it involves managing an intricate ecosystem of interconnected cloud services and third-party integrations. As development teams consolidate their operations within these environments, the primary source of truth—the