{"id":43844,"date":"2026-02-23T05:05:58","date_gmt":"2026-02-22T21:05:58","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/23\/hackers-hide-pulsar-rat-inside-png-images-in-new-npm-supply-chain-attack\/"},"modified":"2026-02-23T05:05:58","modified_gmt":"2026-02-22T21:05:58","slug":"hackers-hide-pulsar-rat-inside-png-images-in-new-npm-supply-chain-attack","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/23\/hackers-hide-pulsar-rat-inside-png-images-in-new-npm-supply-chain-attack\/","title":{"rendered":"Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack"},"content":{"rendered":"\n<p>A new type of cyberattack has been discovered that uses ordinary images to hide a dangerous virus. Experts at Veracode Threat Research found a malicious package on NPM, which is a massive website used by millions of software developers to share tools. The package was designed to look like a normal piece of software, but its real goal was to take over a person\u2019s computer.<\/p>\n<p>The package was named <strong><code>buildrunner-dev<\/code><\/strong>. This is where the trick lies, as the hackers used a <a href=\"https:\/\/hackread.com\/npm-typosquatting-attack-deliver-r77-rootkit\/\" target=\"_blank\" data-type=\"post\" data-id=\"100472\" rel=\"noreferrer noopener\"><strong>typosquatting technique<\/strong><\/a> where they gave it a name that is almost the same as a real, safe tool called buildrunner, hoping someone would make a spelling mistake and download it by accident. This shows that the attack starts the moment the software is installed.<\/p>\n<div>\n<figure><a href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/Malicious-NPM-Package-Found-Hiding-Pulsar-Malware-in-Simple-Image-Files.png\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"224\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/Malicious-NPM-Package-Found-Hiding-Pulsar-Malware-in-Simple-Image-Files.png\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/Malicious-NPM-Package-Found-Hiding-Pulsar-Malware-in-Simple-Image-Files.png 640w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/Malicious-NPM-Package-Found-Hiding-Pulsar-Malware-in-Simple-Image-Files-300x105.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/Malicious-NPM-Package-Found-Hiding-Pulsar-Malware-in-Simple-Image-Files-380x133.png 380w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" alt=\"Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack\" \/><\/a><figcaption>The malicious package (Source: Veracode)<\/figcaption><\/figure>\n<\/p><\/div>\n<h3><strong>A Very Messy Distraction<\/strong><\/h3>\n<p>Once the package is on a computer, it runs a script that downloads a file called packageloader.bat. For your information, this file is huge and very confusing. It has over 1,600 lines of text, but most of it is just &#8220;noise&#8221; to hide the virus from security scanners, Veracode researchers explained in the <a href=\"https:\/\/www.veracode.com\/blog\/malicious-npm-package-hiding-in-plain-pixels\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>blog post<\/strong><\/a> shared exclusively with Hackread.com.<\/p>\n<p>According to researchers, the file is full of random words like &#8220;raven,&#8221; &#8220;glacier,&#8221; and &#8220;monsoon&#8221; that don&#8217;t actually do anything. Out of the whole file, only about 21 lines are real commands. Further probing revealed that the malware is also quite smart; it checks to see if you have antivirus programs like ESET, Malwarebytes, or F-Secure.<\/p>\n<p>If it finds them, it uses different tricks to sneak past them without setting off any alarms. It first copies itself to a hidden folder as protect.bat so it can stay on the computer. It then checks if it has &#8220;Admin&#8221; rights. If it doesn\u2019t, it uses a Windows tool called <code><strong>fodhelper.exe<\/strong><\/code> to bypass security warnings, so the user never sees a pop-up asking for permission.<\/p>\n<h3><strong>Hiding Inside an Image<\/strong><\/h3>\n<p>The most interesting part of this attack is how it hides the actual virus inside an image. This is called <a href=\"https:\/\/hackread.com\/your-shipment-notification-malware-dropper\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>steganography<\/strong><\/a>. The malware downloads a <strong><a href=\"https:\/\/hackread.com\/malicious-vs-code-extensions-trojan-fake-png-files\/\" data-type=\"post\" data-id=\"138435\" target=\"_blank\" rel=\"noreferrer noopener\">PNG image<\/a><\/strong> from a free hosting site, which, to a normal person, just looks like fuzzy, grainy &#8220;noise.&#8221; However, the malware is programmed to read the tiny bits of colour data, known as RGB pixel values, to find hidden code.<\/p>\n<p>Also, researchers found that the malware uses a trick called process hollowing, where it replaces the &#8220;insides&#8221; of a safe program with malicious code to look like a normal process. It then installs a final malware called <strong><a href=\"https:\/\/hackread.com\/windows-malware-pulsar-rat-live-chats-steal-data\/\" target=\"_blank\" data-type=\"post\" data-id=\"140892\" rel=\"noreferrer noopener\">Pulsar RAT<\/a><\/strong>. <\/p>\n<p>Pulsar is a Remote Access Trojan that gives hackers full control of the computer. The hackers used strange names like <code><strong>CheaperMyanmarCaribbean.exe<\/strong><\/code> to keep the virus hidden in the computer&#8217;s memory. While this was found in a tool for tech experts on NPM, it shows that even a simple image file can be used to hide a major threat.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"Hackers Hide Pulsar RAT Inside PNG Images in New NPM Supply Chain Attack\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A new type of cyberattack has been discovered that uses [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-43844","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43844"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43844\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}