3 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
The lotusbail npm package masquerades as a legitimate WhatsApp API library but contains sophisticated malware that steals user credentials, messages, and contacts. It captures data by intercepting communications and uses custom encryption to evade detection. Even after uninstalling the package, attackers retain access to compromised accounts.
If you do, here's more
The lotusbail npm package masquerades as a WhatsApp Web API library, boasting over 56,000 downloads and functionality that works as expected. However, beneath its surface lies sophisticated malware designed to steal WhatsApp credentials, intercept messages, and harvest contacts. The package, which has been active for six months, wraps a legitimate WebSocket client to relay messages, capturing authentication tokens, message history, and media files in the process. This malware operates seamlessly, making it difficult for developers to detect any malicious behavior.
One of the more alarming aspects of this attack is its method of exfiltration. The malware utilizes a custom RSA implementation to encrypt stolen data before transmission, which is hidden through multiple layers of obfuscation. The exfiltration server URL is embedded in encrypted configuration strings, ensuring that it remains concealed from standard network monitoring. Additionally, the malware establishes a persistent backdoor by hijacking WhatsApp's device pairing process. This grants threat actors long-term access to victims' accounts, even after the npm package is removed.
Compounding the issue, the package contains 27 infinite loop traps designed to thwart debugging efforts, making it challenging for security researchers to analyze the code dynamically. Legitimate code reviews fail to catch this threat because the package functions as advertised. Traditional security measures rely on static analysis, which is insufficient against such advanced supply chain attacks. The lotusbail incident highlights the need for behavioral analysis that can monitor actual runtime behavior to identify malicious activities hidden behind seemingly legitimate code.
Questions about this article
No questions yet.