{"id":225392,"date":"2025-11-19T02:04:08","date_gmt":"2025-11-19T08:04:08","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/11\/seven-npm-packages-use-adspect-cloaking-to-trick-victims-into-crypto-scam-pages"},"modified":"2025-11-19T02:04:08","modified_gmt":"2025-11-19T08:04:08","slug":"seven-npm-packages-use-adspect-cloaking-to-trick-victims-into-crypto-scam-pages","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/11\/seven-npm-packages-use-adspect-cloaking-to-trick-victims-into-crypto-scam-pages","title":{"rendered":"Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/seven-npm-packages-use-adspect-cloaking-to-trick-victims-into-crypto-scam-pages.jpg\"><\/a><\/p>\n<p>Cybersecurity researchers have <a href=\"https:\/\/socket.dev\/blog\/npm-malware-campaign-uses-adspect-cloaking-to-deliver-malicious-redirects\" rel=\"noopener\" target=\"_blank\">discovered<\/a> a set of seven npm packages published by a single threat actor that leverages a cloaking service called Adspect to differentiate between real victims and security researchers to ultimately redirect them to sketchy crypto-themed sites.<\/p>\n<p>The malicious npm packages, published by a threat actor named \u201c<a href=\"https:\/\/www.npmjs.com\/~dino_reborn\" rel=\"noopener\" target=\"_blank\">dino_reborn<\/a>\u201d between September and November 2025, are listed below. The npm account no longer exists on npm as of writing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking service called Adspect to differentiate between real victims and security researchers to ultimately redirect them to sketchy crypto-themed sites. The malicious npm packages, published by a threat actor named \u201cdino_reborn\u201d between September and November 2025, [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-225392","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/225392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=225392"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/225392\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=225392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=225392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=225392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}