Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Iranian-Nexus Targets Oman Ministries: Webshells & Data
May 6, 2026
Remus Infostealer Uses Lumma-Style Browser Key Theft and
May 6, 2026
Zero-Auth Flaw Exposes DoD Contractor Cross- Cross-Tenant Data
May 6, 2026
Home/Threats/npm Supply Chain Attack: undicy-http Depl Uses Deploy
Threats

npm Supply Chain Attack: undicy-http Depl Uses Deploy

It also scans for analysis tools like Wireshark, IDA, and Ghidra. To deceive the victim, it displays a fake missing-DLL Windows error dialog even as its payload continues running silently in the...

Marcus Rodriguez
Marcus Rodriguez
April 1, 2026 One Min Read
1 0

It also scans for analysis tools like Wireshark, IDA, and Ghidra. To deceive the victim, it displays a fake missing-DLL Windows error dialog even as its payload continues running silently in the background.

The native binary chromelevator.exe goes even further by using direct syscalls that sidestep standard ntdll.dll APIs, bypassing EDR and antivirus hooks at the user-mode level. 

Developers should immediately run npm uninstall undicy-http, end all node and wscript.exe processes, and remove the ScreenLiveClient scheduled task and its registry key.

Delete the VBS files from the temp folder and reinstall all Discord clients to clear injected code. Rotate all passwords, Discord tokens, and session credentials for Roblox, Instagram, Spotify, TikTok, Steam, and Telegram.

Move cryptocurrency to new wallets with fresh seed phrases on a clean machine, and block the C2 address 24[.]152[.]36[.]243 and domain amoboobs[.]com. Re-imaging the system is advised if chromelevator.exe ran, as manual cleanup alone cannot guarantee full system trust.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

Attack

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

PNG Flaws: Attackers Crash Processes & Leak Vulnerabilities Allow

Next Post

Hackers Backdoor Telnyx Python SDK on PyPI to Steal Credentials

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Azure AD Conditional Access Bypass: Phantom Device PR
May 6, 2026
Critical Palo Alto Firewall Vulnerability Exploited for Root Access
May 6, 2026
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
Top Authors
Sarah simpson
Sarah simpson
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us