
Photo Credit: Unsplash.com Lacework Labs, as reported by colleagues at Infosecurity-magazine, explained:
Over time, we've seen scanning activity evolve into attacks more frequent, including some who have deployed crypto-miners and Distributed Denial of Service (DDoS) bots to affected systems. In addition to improving their payloads, attackers have continued to adapt their exploitation methods to be one step ahead of the signature-based detections used by many types of security products.
Photo Credit: Unsplash.com In addition to Log4j, several hacker groups have also used a backdoor in the NPM package ua-parser-js to gain access to Linux systems and launch the XMRig open-source miner . Apparently, NPM has also been used for other purposes, so much so that some groups have simplified the process to more easily distribute malware through this method. Specifically, Lacework Labs stated in this regard:
Attackers have fully automated the NPM account creation process and opened dedicated accounts, one per package, making their new malicious packages much more difficult to detect. At the time of writing, the man responsible for the 'RED-LILI' threat is still active and continues to distribute malicious packages.