Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsHackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack
Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack
Cybersecurity

Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack

•February 22, 2026
0
HackRead
HackRead•Feb 22, 2026

Why It Matters

The incident highlights how seemingly innocuous developer dependencies can become vectors for sophisticated, image‑based malware, raising supply‑chain risk for the entire JavaScript ecosystem. Organizations must tighten package vetting and monitoring to prevent similar compromises.

Key Takeaways

  • •Typosquatted NPM package mimics buildrunner
  • •Malware hides Pulsar RAT inside PNG via steganography
  • •Batch loader uses noise to evade scanners
  • •Checks for AV and uses fodhelper.exe bypass
  • •Process hollowing delivers remote access trojan

Pulse Analysis

Supply‑chain attacks on open‑source repositories have surged, and NPM remains a prime target due to its massive user base. Threat actors now leverage typosquatting—registering packages with names that closely resemble popular tools—to trick developers into installing malicious code inadvertently. This tactic lowers the barrier to entry, allowing attackers to embed payloads directly into the development workflow, where they can spread rapidly across projects and organizations that rely on automated dependency resolution.

The technical sophistication of the buildrunner‑dev attack lies in its use of steganography to hide the Pulsar RAT inside a seemingly harmless PNG file. The malware extracts hidden instructions by parsing RGB pixel values, a method that bypasses conventional file‑type scanning. Coupled with a 1,600‑line batch script filled with random words, the payload evades signature‑based detection. Additional evasion techniques—such as checking for specific antivirus products, copying to hidden directories, and leveraging Windows' fodhelper.exe for privilege escalation—demonstrate a layered approach to bypassing security controls.

Pulsar RAT provides attackers with full remote control, enabling data exfiltration, credential theft, and lateral movement within compromised networks. Its deployment via process hollowing further obscures its presence, making detection by behavioral analytics challenging. For enterprises, the incident underscores the necessity of implementing strict package‑origin verification, employing software‑bill‑of‑materials (SBOM) tracking, and integrating runtime monitoring that can flag anomalous file‑type usage. Proactive defenses, combined with developer education on typosquatting risks, are essential to safeguard the modern software supply chain.

Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...