Malicious RubyGems Packages Target Korean Spam Marketers
Summary
Hide ▲
Show ▼
A Korean threat actor, known by various aliases such as 'soonje,' has been distributing 60 malicious RubyGems packages since March 2023. These packages, designed to assist gray-hat Korean marketers in generating bulk content and engagement on social media platforms, also steal credentials from users. The packages have been downloaded over 275,000 times, with 16 still active. The actor targets spam marketers, who are less likely to report being compromised due to the nature of their activities. The malware steals usernames, passwords, and MAC addresses, potentially to exploit existing audiences for further spam or disinformation campaigns.
Timeline
-
08.08.2025 23:47 1 articles · 1mo ago
Malicious RubyGems Packages Target Korean Spam Marketers
A Korean threat actor has been distributing 60 malicious RubyGems packages since March 2023. These packages, designed to assist gray-hat marketers, also steal credentials from users. The packages have been downloaded over 275,000 times, with 16 still active. The actor targets spam marketers, who are less likely to report being compromised due to the nature of their activities. The malware steals usernames, passwords, and MAC addresses, potentially to exploit existing audiences for further spam or disinformation campaigns.
Show sources
- 60 RubyGems Packages Steal Data From Annoying Spammers — www.darkreading.com — 08.08.2025 23:47
Information Snippets
-
The threat actor has been active since March 2023, publishing 60 malicious RubyGems packages.
First reported: 08.08.2025 23:471 source, 1 articleShow sources
- 60 RubyGems Packages Steal Data From Annoying Spammers — www.darkreading.com — 08.08.2025 23:47
-
The packages are designed to help gray-hat marketers generate bulk content and engagement on social media platforms.
First reported: 08.08.2025 23:471 source, 1 articleShow sources
- 60 RubyGems Packages Steal Data From Annoying Spammers — www.darkreading.com — 08.08.2025 23:47
-
The malware steals usernames, passwords, and MAC addresses from users.
First reported: 08.08.2025 23:471 source, 1 articleShow sources
- 60 RubyGems Packages Steal Data From Annoying Spammers — www.darkreading.com — 08.08.2025 23:47
-
The packages have been downloaded over 275,000 times, with 16 still active.
First reported: 08.08.2025 23:471 source, 1 articleShow sources
- 60 RubyGems Packages Steal Data From Annoying Spammers — www.darkreading.com — 08.08.2025 23:47
-
The actor targets spam marketers, who are less likely to report being compromised.
First reported: 08.08.2025 23:471 source, 1 articleShow sources
- 60 RubyGems Packages Steal Data From Annoying Spammers — www.darkreading.com — 08.08.2025 23:47
-
The malware may be used to exploit existing audiences for further spam or disinformation campaigns.
First reported: 08.08.2025 23:471 source, 1 articleShow sources
- 60 RubyGems Packages Steal Data From Annoying Spammers — www.darkreading.com — 08.08.2025 23:47
-
The threat actor has unpublished 44 of the packages, potentially to reduce visibility.
First reported: 08.08.2025 23:471 source, 1 articleShow sources
- 60 RubyGems Packages Steal Data From Annoying Spammers — www.darkreading.com — 08.08.2025 23:47
-
RubyGems' smaller dependency trees mean attackers often rely on direct installs, reducing accidental infections.
First reported: 08.08.2025 23:471 source, 1 articleShow sources
- 60 RubyGems Packages Steal Data From Annoying Spammers — www.darkreading.com — 08.08.2025 23:47
-
The actor benefits from targeting spam marketers, who are less likely to report being compromised due to social stigma.
First reported: 08.08.2025 23:471 source, 1 articleShow sources
- 60 RubyGems Packages Steal Data From Annoying Spammers — www.darkreading.com — 08.08.2025 23:47
Similar Happenings
GPUGate Malware Campaign Targets IT Firms in Western Europe
A sophisticated malware campaign, codenamed GPUGate, targets IT and software development companies in Western Europe, with recent expansions to macOS users. The campaign leverages Google Ads, SEO poisoning, and fake GitHub commits to deliver malware, including the Atomic macOS Stealer (AMOS). The attack began in December 2024 and uses a 128 MB Microsoft Software Installer (MSI) to evade detection. The malware employs GPU-gated decryption and various techniques to avoid analysis and detection. The end goal is information theft and delivery of secondary payloads. The threat actors have native Russian language proficiency and use a cross-platform approach. The campaign has expanded to target macOS users through fake GitHub repositories. These repositories impersonate popular tools and use SEO poisoning to distribute the Atomic Stealer malware. The threat actors use multiple GitHub usernames to evade takedowns and deploy malware via Terminal commands. Similar tactics have been observed in previous campaigns using malicious Google Ads and public GitHub repositories. The AMOS malware now includes a backdoor component for persistent, stealthy access to compromised systems. The campaign impersonates over 100 software solutions, including 1Password, Dropbox, Confluence, Robinhood, Fidelity, Notion, Gemini, Audacity, Adobe After Effects, Thunderbird, and SentinelOne. The fake GitHub pages were created on September 16, 2025, and were immediately submitted for takedown. The campaign has been active since at least April 2023, with previous similar campaigns observed in July 2025.
Supply Chain Attack Targets npm Packages with Over 2.6 Billion Weekly Downloads
A supply chain attack involving multiple npm packages with over 2.6 billion weekly downloads has been discovered. The attack, which began in April 2025, involved the injection of malicious code into npm packages after compromising a maintainer's account via a phishing attack. The malicious code targets cryptocurrency wallets, including Atomic and Exodus, and redirects transactions to addresses controlled by threat actors. The attack has now expanded to include additional maintainers and packages, further broadening its impact. The attack impacted roughly 10% of all cloud environments, but the attackers made little profit. The malicious packages were removed within two hours of the attack, and the injected code targeted browser environments, hooking Ethereum and Solana signing requests. The attack was discovered and mitigated quickly, preventing more severe security incidents. The attack follows a series of similar incidents targeting JavaScript libraries, emphasizing the ongoing threat to the npm ecosystem and the broader supply chain. The compromised packages include popular ones such as ansi-regex, ansi-styles, chalk, debug, and others, collectively attracting over 2 billion weekly downloads. The malicious code operates by intercepting network traffic and application APIs, targeting various cryptocurrencies including Ethereum, Bitcoin, Solana, Tron, Litecoin, and Bitcoin Cash.
Malicious nx Packages Exfiltrate Credentials in 's1ngularity' Supply Chain Attack
The Shai-Hulud attack, a self-replicating malware, has compromised at least 187 npm packages, affecting multiple maintainers. The attack uses a self-propagating mechanism to infect other packages by the same maintainer, modifying package.json, injecting a bundle.js script, repacking the archive, and republishing it. The malware uses TruffleHog to search the host for tokens and cloud credentials, creating unauthorized GitHub Actions workflows within repositories and exfiltrating sensitive data to a hardcoded webhook endpoint. The attack is named 'Shai-Hulud' after the shai-hulud.yaml workflow files used by the malware and follows the 's1ngularity' attack, potentially orchestrated by the same attackers. The attack unfolded in three phases, impacting 2,180 accounts and 7,200 repositories. The first phase, between August 26 and 27, directly impacted 1,700 users, leaking over 2,000 unique secrets and exposing 20,000 files. The second phase, between August 28 and 29, compromised an additional 480 accounts, mostly organizations, and exposed 6,700 private repositories. The third phase, beginning on August 31, targeted a single victim organization, publishing an additional 500 private repositories. The attackers used AI-powered CLI tools like Claude, Q, and Gemini to dynamically scan for high-value secrets, tuning the prompts for better success.
MixShell Malware Targets U.S. Supply Chain Manufacturers via Contact Forms
A sophisticated social engineering campaign, codenamed ZipLine, targets U.S. supply chain manufacturers with MixShell malware. Attackers use legitimate contact forms to initiate conversations, eventually delivering malicious ZIP files. The campaign spans multiple sectors and countries, focusing on critical supply chain industries. The MixShell malware operates in-memory, using DNS tunneling and HTTP for command-and-control (C2) communications. It employs advanced evasion techniques and leverages legitimate services to blend into normal network activity. The attackers use abandoned or dormant domains to increase the credibility of their phishing attempts. The campaign poses significant risks, including intellectual property theft, ransomware, financial fraud, and supply chain disruptions. The attackers target a wide range of industries, including industrial manufacturers, hardware, semiconductors, consumer goods, biotech, and pharma companies.
UNC6384 Targets Diplomats with PlugX via Captive Portal Hijacks
UNC6384, a China-nexus threat actor, has been targeting diplomats in Southeast Asia and other entities globally to advance Beijing's strategic interests. The group employs a multi-stage attack chain leveraging advanced social engineering, valid code signing certificates, adversary-in-the-middle (AitM) attacks, and indirect execution techniques to evade detection. The campaign, detected in March 2025, uses captive portal redirections to deliver a PlugX variant called SOGU.SEC. The attacks involve redirecting web traffic through a captive portal to a threat actor-controlled website, downloading a digitally signed downloader (STATICPLUGIN), and deploying the SOGU.SEC backdoor in memory. The malware supports commands to exfiltrate files, log keystrokes, and launch remote command shells. The campaign highlights the sophistication of PRC-nexus threat actors and their evolving operational capabilities. The campaign targeted around two dozen victims, primarily Southeast Asian diplomats, between March and July 2025. The attack chain involved compromised edge devices intercepting captive portal checks and redirecting users to a malicious website. The malicious website used a valid TLS/SSL certificate issued by Let's Encrypt to avoid browser security warnings. The first-stage malware, STATICPLUGIN, dropped a launcher called CANONSTAGER, which used unconventional techniques to hide its activities. The final payload was a variant of the PlugX backdoor, tracked by Google as SOGU.SEC. In September 2025, new information revealed that the PlugX variant overlaps with RainyDay and Turian backdoors, targeting telecommunications and manufacturing sectors in Central and South Asia. The campaign is linked to Mustang Panda, which also uses Bookworm malware. Bookworm has been used since 2015 and includes capabilities to execute commands, upload/download files, exfiltrate data, and establish persistent access.