QR Code Chaos: Fezbox’s Sneaky Malware Trick Exposed!
Beware the Fezbox! This malicious npm package uses a QR code to steal usernames and passwords from web cookies. It’s like a magic trick, but instead of pulling a rabbit out of a hat, it’s extracting your credentials from a browser. Thanks to Socket’s AI scanner, this nefarious act has been stopped in its tracks.

Hot Take:
Who knew QR codes could be a hacker’s new best friend? Fezbox takes “scanning your code” to a whole new level. Looks like your web cookies just became the latest cookie monster’s snack of choice! Next time someone asks you to scan a QR code, maybe think twice—your passwords might stick to it like chocolate chips!
Key Points:
– Fezbox uses a QR code to hide malicious payloads, targeting username and password theft.
– The package was discovered by Socket’s AI-based malware scanner before it could wreak more havoc.
– Fezbox pretended to be a helpful JavaScript/TypeScript library but had a sinister side.
– The malicious payload activates after a 120-second delay, cleverly hiding its true intentions.
– Socket emphasizes the need for automated scanning to preemptively catch sneaky packages like Fezbox.