This code implements a covert data exfiltration mechanism via DNS tunneling to a suspicious external domain (dataflow[.]postcss-theme-shorthand-sectest[.]cf), stealing sensitive system information (public IP address, hostname, and current working directory) without user consent. The malware works by chunking the collected data, encoding it as hexadecimal strings, and sending it as DNS queries to avoid detection by standard security monitoring. It explicitly adds public DNS servers (1.1.1.1, 1.0.0.1, 8.8.8.8, 8.8.4.4) to ensure the DNS exfiltration succeeds. This implementation represents a sophisticated supply chain attack with data theft capability.
Live on npm for 5 hours and 26 minutes before removal. Socket users were protected even while the package was live.