This mysterious hacker is leaving hidden messages for the investigators on their tail

illustration of a hacker using a laptop
(Image credit: delcarmat / Shutterstock)

A mysterious threat actor has left a trail of hidden messages for the researchers investigating their attacks.

Cybersecurity firm Checkmarx recently published a blog post on a threat actor dubbed RED-LILI, which has been distributing malicious NPM packages using automatically created user accounts. 

The company also created the RED-LILI Tracker to share information about the attacker's packages with the community.

However, the latest findings suggest RED-LILI has not taken kindly to the attention from researchers at Checkmarx.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Secret messages

RED-LILI responded to the blog by changing up its tactics. Besides trying to make the malicious packages seem more credible, and obfuscating the malicious code, the threat actor also started leaving messages to the researchers.

These messages were being delivered through package names, which “diverged from the normal pattern”, including:

  • dontbelikethat
  • notsobrilliant
  • dontgothereever
  • dontblowthisoff 
  • heisnotwhatyousee
  • helloboy634
  • nosoawesome232
  • F**kyouscanner

Since the initial report, RED-LILI slowed down and paused the burst automation attacks, the researchers found. RED-LILI also dumped old domain names and registered a new domain: 22timer[.]ga. 

The researchers believe the next wave of the attack is yet to come, as RED-LILI now explores and publishes cherry-picked packages, each with its own unique evasion mechanism. 

“However, the attacker’s thumbprint still remains as they re-use similar characteristics (code similarity, same identifying strings, etc.),” the researchers concluded.

“In recent packages, they are doing it while exfiltrating the data they collect to previously unknown addresses on different services, from what we have seen before such as free webhook services, for example, pipedream and requestbin.”

A detailed breakdown of the group’s methods, as well as all the package names that have so far been uncovered, can be found here

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Image depicting a hand on a scanner
New Lazarus Group campaign sees North Korean hackers spreading undetectable malware through GitHub and open source packages
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Juniper VPN gateways targeted by stealthy "magic" malware
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
North Korean Lazarus hackers launch large-scale cyberattack by cloning open source software
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Fake Reddit sites found pushing Lumma Stealer malware
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
A digital representation of a lock
Looking for a new job? Watch out you don't fall for this new malware scam
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)