top of page

Hackers Exploit Adspect Cloaking and Fake Crypto CAPTCHA in npm Supply Chain Attack

  • Nov 19, 2025
  • 2 min read

Key Findings


  • Seven npm packages published by a threat actor using the alias "dino_reborn" were found to be part of a highly coordinated malware campaign

  • The packages use Adspect-powered cloaking, anti-analysis JavaScript, and fake CAPTCHA interfaces to funnel unsuspecting victims toward malicious payloads while hiding their activity from security researchers

  • The threat actor built an entire fake website to serve security researchers while real victims are redirected through a deceptive CAPTCHA flow


Background


The Socket Threat Research Team has uncovered a malware campaign operating across seven npm packages, all published by the threat actor "dino_reborn." The packages were found to leverage Adspect, a commercial cloaking service, to fingerprint users and differentiate between victims and security researchers.


Adspect Cloaking and Fake CAPTCHA


  • The packages use Adspect to collect detailed user information, including user agent, host, referrer, port, locale, encoding, timestamps, and browser language

  • Based on this fingerprint, Adspect decides whether to show a fake CAPTCHA (leading to a malicious redirect) or a decoy white page

  • The CAPTCHA sequence is intentionally slow (3 seconds validating, 1 second "success") to evade automated scanning tools and trick users into believing the redirect is legitimate

  • The fake CAPTCHA displays logos or domain names associated with real crypto exchanges, likely to steal cryptocurrency from victims


Anti-Analysis Techniques


  • The packages aggressively resist inspection, blocking right-click, F12, Ctrl+U, Ctrl+Shift+I, and detecting DevTools

  • These measures make it extremely difficult for security researchers to view the DOM, JavaScript logic, network requests, and redirect mechanisms


Decoy White Page


  • The seventh package, "signals-embed," contains the code for a fake corporate site called Offlido, complete with compliance text, contact forms, and a full privacy policy

  • This polished decoy page is meant to look legitimate while masking the attacker's infrastructure


Interconnected Malware Ecosystem


  • The six malicious packages share code, APIs, and infrastructure, forming a fully interconnected malware ecosystem within npm

  • The packages were published between September and November 2025, but the npm account no longer exists as of writing


Sources


  • https://securityonline.info/npm-supply-chain-attack-hackers-use-adspect-cloaking-and-fake-crypto-captcha-to-deceive-victims-and-researchers/

  • https://thehackernews.com/2025/11/seven-npm-packages-use-adspect-cloaking.html

  • https://www.itsecuritynews.info/seven-npm-packages-use-adspect-cloaking-to-trick-victims-into-crypto-scam-pages/

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page