{"id":3816,"date":"2025-09-10T01:54:32","date_gmt":"2025-09-10T01:54:32","guid":{"rendered":"https:\/\/dizainoarkliukas.lt\/?p=3816"},"modified":"2025-09-10T01:54:32","modified_gmt":"2025-09-10T01:54:32","slug":"crypto-veatting-kenkejisku-programu-infiltruoja-pagrindines-javascript-bibliotekas-kurias-naudoja-milijonai","status":"publish","type":"post","link":"https:\/\/dizainoarkliukas.lt\/?p=3816","title":{"rendered":"\u201eCrypto Veatting\u201c kenk\u0117ji\u0161k\u0173 program\u0173 infiltruoja pagrindines \u201eJavaScript\u201c bibliotekas, kurias naudoja milijonai"},"content":{"rendered":"<p><\/p>\n<div>\n<p>NPM (\u201eNode Packet Manager\u201c) k\u016br\u0117jo \u201eQix\u201c s\u0105skaita buvo pa\u017eeista, leid\u017eianti \u012fsilau\u017e\u0117liams paskelbti kenksmingas jo paket\u0173 versijas.<\/p>\n<p>U\u017epuolikai paskelb\u0117 kenksmingus de\u0161im\u010di\u0173 ypa\u010d populiari\u0173 \u201eJavaScript\u201c paket\u0173, \u012fskaitant pagrindines komunalines paslaugas, versijas. \u201eHack\u201c buvo did\u017eiul\u0117, nes paveiktose pakuot\u0117se buvo daugiau nei 1 milijardas savaitini\u0173 atsisiuntim\u0173.<\/p>\n<p>\u0160i programin\u0117s \u012frangos tiekimo grandin\u0117s ataka konkre\u010diai nukreipta \u012f \u201eJavaScript\/Node.js\u201c ekosistem\u0105.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">NPM tiekimo grandin\u0117s ataka<\/p>\n<p>Populiarus \u201eDev Qix\u201c nukent\u0117jo nuo suk\u010diavimo. Kenk\u0117ji\u0161kas kodas, \u012f\u0161virk\u0161tas \u012f NPM paketus, dabar u\u017egrobia kriptovaliut\u0173 operacijas pasira\u0161ant.<\/p>\n<p>Atakos metodas:<br \/>\u2022 Kabliuk\u0173 pinigin\u0117s funkcijos (u\u017eklausa\/si\u0173sti)<br \/>\u2022 Main\u0173 gav\u0117jo adresai ETH\/SOL operacijose<br \/>\u2022 Pakei\u010dia &#8230; <a href=\"https:\/\/t.co\/Jn9H4HWP8v\" data-wpel-link=\"external\" target=\"_blank\">pic.twitter.com\/jn9h4hwp8v<\/a><\/p>\n<p>&#8211; Suktyb\u0117s \u0161nip\u0161tas | \u201eWeb3\u201c anti-Scam (@RealSCAMSNIFFER) <a href=\"https:\/\/twitter.com\/realScamSniffer\/status\/1965183460269850745?ref_src=twsrc%5Etfw\" data-wpel-link=\"external\" target=\"_blank\">2025 m. Rugs\u0117jo 8 d<\/a><\/p>\n<\/blockquote>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Turinys:<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/dizainoarkliukas.lt\/?p=3816\/#%E2%80%9ECrypto_Clipper%E2%80%9C_kenkejiska_programa\" >\u201eCrypto Clipper\u201c kenk\u0117ji\u0161ka programa<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/dizainoarkliukas.lt\/?p=3816\/#Plataus_atakos_vektorius\" >Plataus atakos vektorius<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"%E2%80%9ECrypto_Clipper%E2%80%9C_kenkejiska_programa\"><\/span>\u201eCrypto Clipper\u201c kenk\u0117ji\u0161ka programa<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Kenk\u0117ji\u0161kas kodas buvo \u201ekriptovaliutas\u201c, skirtas pavogti kriptovaliut\u0105, kei\u010diant pinigin\u0117s adresus tinklo u\u017eklausose ir tiesiogiai u\u017egrobiant kriptovaliut\u0173 operacijas. Jis taip pat buvo labai u\u017emaskuotas, kad b\u016bt\u0173 i\u0161vengta aptikimo.<\/p>\n<p>\u201eCrypto Veating\u201c kenk\u0117ji\u0161ka programin\u0117 \u012franga turi du puolimo vektorius. Kai nerandama \u201eCrypto Wallet\u201c pl\u0117tinys, kenk\u0117ji\u0161kos programos perima vis\u0105 tinklo sraut\u0105, pakeisdama nar\u0161ykl\u0117s gimt\u0105j\u012f FETCH ir HTTP u\u017eklaus\u0173 funkcijas su i\u0161samiais u\u017epuoliko valdom\u0173 pinigin\u0117s adres\u0173 s\u0105ra\u0161ais.<\/p>\n<p>Naudodamas sud\u0117ting\u0105 adres\u0173 apsikeitim\u0105, jame naudojami algoritmai, kad b\u016bt\u0173 galima rasti pakaitinius adresus, kurie atrodo vizualiai pana\u0161\u016bs \u012f teis\u0117tus, tod\u0117l suk\u010diavimas beveik ne\u012fmanoma pasteb\u0117ti plika akimi, sak\u0117 kibernetinio saugumo tyrin\u0117tojai.<\/p>\n<p>Jei randama kriptovaliut\u0173 pinigin\u0117, kenk\u0117ji\u0161ka programa prie\u0161 pasira\u0161ydama perima operacijas, o vartotojams inicijuojant operacijas, ji kei\u010dia jas atmintyje \u012f peradresavimo fondus \u012f u\u017epuoliko adresus.<\/p>\n<p>Atakos nukreiptos pakuot\u0117s, tokios kaip \u201ekreida\u201c, \u201eStrip-Ansi\u201c, \u201eColor-Convert\u201c ir \u201eColor-Name\u201c, kurie yra pagrindiniai statybiniai blokai, palaidoti giliai daugyb\u0117s projekt\u0173 priklausomyb\u0117s med\u017eiuose.<\/p>\n<p>Ataka buvo atsitiktinai aptikta, kai pastatymo vamzdynas nepavyko su \u201eFetch\u201c n\u0117ra apibr\u0117\u017eta klaida, nes kenk\u0117ji\u0161ka programin\u0117 \u012franga band\u0117 i\u0161tremti duomenis, naudojant FETCH funkcij\u0105.<\/p>\n<p>&#8222;Jei naudojate aparat\u016bros pinigin\u0119, prie\u0161 pasira\u0161ydami atkreipkite d\u0117mes\u012f \u012f kiekvien\u0105 operacij\u0105, ir esate saugus. Jei nenaudojate aparatin\u0117s \u012frangos pinigin\u0117s, kol kas nesigilinate \u012f bet kokias grandin\u0117s operacijas&#8221;,-patar\u0117 \u201eLedger\u201c generalinis direktorius Charlesas Guillemet.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Dabartinio NPM hack paai\u0161kinimas<\/p>\n<p>Bet kurioje svetain\u0117je, kurioje naudojama \u0161ia nulau\u017eta priklausomyb\u0117, ji suteikia galimyb\u0119 \u012fsilau\u017e\u0117liams suleisti kenksming\u0105 kod\u0105, taigi, pavyzd\u017eiui, kai svetain\u0117je spustel\u0117jate mygtuk\u0105 \u201eKeisti\u201c, kodas gali pakeisti TX, i\u0161si\u0173st\u0105 \u012f j\u016bs\u0173 pinigin\u0119 TX, siun\u010diant pinigus\u2026<\/p>\n<p>&#8211; 0xngmi (@0xngmi) <a href=\"https:\/\/twitter.com\/0xngmi\/status\/1965125988016087050?ref_src=twsrc%5Etfw\" data-wpel-link=\"external\" target=\"_blank\">2025 m. Rugs\u0117jo 8 d<\/a><\/p>\n<\/blockquote>\n<h2><span class=\"ez-toc-section\" id=\"Plataus_atakos_vektorius\"><\/span>Plataus atakos vektorius<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Nors kenk\u0117ji\u0161kos programos naudingas krovinys konkre\u010diai nukreiptas \u012f kriptovaliut\u0105, atakos vektorius yra daug platesnis. Tai daro \u012ftak\u0105 bet kokiai aplinkai, kuriose veikia \u201eJavaScript\/Node.js\u201c programos, tokios kaip \u017einiatinklio programos, veikian\u010dios nar\u0161ykl\u0117se, darbalaukio programos, serverio pus\u0117s \u201eNode.js\u201c programos ir mobiliosios programos, naudojant \u201eJavaScript\u201c sistemas.<\/p>\n<p>Taigi \u012fprastoje verslo \u017einiatinklio programoje nes\u0105moningai gal\u0117t\u0173 b\u016bti \u0161ie kenk\u0117ji\u0161ki paketai, ta\u010diau kenk\u0117ji\u0161ka programin\u0117 \u012franga suaktyv\u0117t\u0173 tik tada, kai vartotojai bendrauja su tos svetain\u0117s kriptovaliuta.<\/p>\n<p>\u201eUniSwap\u201c ir \u201eBlockstream\u201c buvo vieni pirm\u0173j\u0173, kurie patikino vartotojus, kad j\u0173 sistemoms nekilo pavojus.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Kalbant apie NPM tiekimo grandin\u0117s atakos prane\u0161imus:<\/p>\n<p>\u201eUniSwap\u201c programos n\u0117ra pavojaus<\/p>\n<p>M\u016bs\u0173 komanda patvirtino, kad mes nenaudojame joki\u0173 pa\u017eeid\u017eiam\u0173 paveikt\u0173 paket\u0173 versij\u0173<\/p>\n<p>Kaip visada, b\u016bkite budr\u016bs<\/p>\n<p>&#8211; \u201eUniSwap Labs\u201c (@youwap) <a href=\"https:\/\/twitter.com\/Uniswap\/status\/1965162488233930800?ref_src=twsrc%5Etfw\" data-wpel-link=\"external\" target=\"_blank\">2025 m. Rugs\u0117jo 8 d<\/a><\/p>\n<\/blockquote>\n<div class=\"code-block code-block-12\" style=\"margin: 8px 0; clear: both;\">\n<div><center><span style=\"font-size:11px; color: gray;\">Specialus pasi\u016blymas (remiamas)<\/span><\/center><br \/>\n<b>\u201eBinance Free\u201c 600 USD (i\u0161skirtin\u0117 \u201eCryptopotato\u201c): naudokite \u0161i\u0105 nuorod\u0105, kad u\u017eregistruotum\u0117te nauj\u0105 s\u0105skait\u0105 ir gautum\u0117te 600 USD i\u0161skirtin\u012f pasveikinimo pasi\u016blym\u0105 \u201eBinance\u201c<\/b> (I\u0161sami informacija).<\/p>\n<p><b>Ribotas pasi\u016blymas \u201eCryptopotato\u201c skaitytojams \u201eBYBIT\u201c: naudokite \u0161i\u0105 nuorod\u0105 nor\u0117dami registruoti ir atidaryti 500 USD nemokam\u0105 viet\u0105 bet kurioje monetoje!<\/b><\/p>\n<\/div>\n<\/div>\n<p><!-- AI CONTENT END 1 --><\/p><\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><a href=\"https:\/\/cryptopotato.com\/crypto-stealing-malware-infiltrates-core-javascript-libraries-used-by-millions\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NPM (\u201eNode Packet Manager\u201c) k\u016br\u0117jo \u201eQix\u201c s\u0105skaita buvo pa\u017eeista, leid\u017eianti \u012fsilau\u017e\u0117liams paskelbti kenksmingas jo paket\u0173 versijas. U\u017epuolikai paskelb\u0117 kenksmingus de\u0161im\u010di\u0173&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3817,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[86],"tags":[6148,161,6146,6147,3153,574,5942,445,1504,3154,6145],"class_list":["post-3816","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kripto-turtas","tag-bibliotekas","tag-crypto","tag-infiltruoja","tag-javascript","tag-kenkejisku","tag-kurias","tag-milijonai","tag-naudoja","tag-pagrindines","tag-programu","tag-veatting"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u201eCrypto Veatting\u201c kenk\u0117ji\u0161k\u0173 program\u0173 infiltruoja pagrindines \u201eJavaScript\u201c bibliotekas, kurias naudoja milijonai - DizainoArkliukas.LT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dizainoarkliukas.lt\/?p=3816\" \/>\n<meta property=\"og:locale\" content=\"lt_LT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201eCrypto Veatting\u201c kenk\u0117ji\u0161k\u0173 program\u0173 infiltruoja pagrindines \u201eJavaScript\u201c bibliotekas, kurias naudoja milijonai - DizainoArkliukas.LT\" \/>\n<meta property=\"og:description\" content=\"NPM (\u201eNode Packet Manager\u201c) k\u016br\u0117jo \u201eQix\u201c s\u0105skaita buvo pa\u017eeista, leid\u017eianti \u012fsilau\u017e\u0117liams paskelbti kenksmingas jo paket\u0173 versijas. U\u017epuolikai paskelb\u0117 kenksmingus de\u0161im\u010di\u0173&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dizainoarkliukas.lt\/?p=3816\" \/>\n<meta property=\"og:site_name\" content=\"DizainoArkliukas.LT\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-10T01:54:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptopotato.com\/wp-content\/uploads\/2021\/01\/Malware-min.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minut\u0117s\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dizainoarkliukas.lt\/?p=3816#article\",\"isPartOf\":{\"@id\":\"https:\/\/dizainoarkliukas.lt\/?p=3816\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/dizainoarkliukas.lt\/#\/schema\/person\/df455e1ad6975b49e5033c007baf6d7c\"},\"headline\":\"\u201eCrypto Veatting\u201c kenk\u0117ji\u0161k\u0173 program\u0173 infiltruoja pagrindines \u201eJavaScript\u201c bibliotekas, kurias naudoja milijonai\",\"datePublished\":\"2025-09-10T01:54:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dizainoarkliukas.lt\/?p=3816\"},\"wordCount\":647,\"image\":{\"@id\":\"https:\/\/dizainoarkliukas.lt\/?p=3816#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dizainoarkliukas.lt\/wp-content\/uploads\/2025\/09\/\u201eCrypto-Veatting-kenkejisku-programu-infiltruoja-pagrindines-\u201eJavaScript-bibliotekas-kurias-naudoja.jpg\",\"keywords\":[\"bibliotekas\",\"Crypto\",\"infiltruoja\",\"JavaScript\",\"kenk\u0117ji\u0161k\u0173\",\"kurias\",\"milijonai\",\"naudoja\",\"pagrindin\u0117s\",\"program\u0173\",\"Veatting\"],\"articleSection\":[\"KRIPTO TURTAS\"],\"inLanguage\":\"lt-LT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dizainoarkliukas.lt\/?p=3816\",\"url\":\"https:\/\/dizainoarkliukas.lt\/?p=3816\",\"name\":\"\u201eCrypto Veatting\u201c kenk\u0117ji\u0161k\u0173 program\u0173 infiltruoja pagrindines \u201eJavaScript\u201c bibliotekas, kurias naudoja milijonai - DizainoArkliukas.LT\",\"isPartOf\":{\"@id\":\"https:\/\/dizainoarkliukas.lt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dizainoarkliukas.lt\/?p=3816#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dizainoarkliukas.lt\/?p=3816#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dizainoarkliukas.lt\/wp-content\/uploads\/2025\/09\/\u201eCrypto-Veatting-kenkejisku-programu-infiltruoja-pagrindines-\u201eJavaScript-bibliotekas-kurias-naudoja.jpg\",\"datePublished\":\"2025-09-10T01:54:32+00:00\",\"author\":{\"@id\":\"https:\/\/dizainoarkliukas.lt\/#\/schema\/person\/df455e1ad6975b49e5033c007baf6d7c\"},\"breadcrumb\":{\"@id\":\"https:\/\/dizainoarkliukas.lt\/?p=3816#breadcrumb\"},\"inLanguage\":\"lt-LT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dizainoarkliukas.lt\/?p=3816\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\/\/dizainoarkliukas.lt\/?p=3816#primaryimage\",\"url\":\"https:\/\/dizainoarkliukas.lt\/wp-content\/uploads\/2025\/09\/\u201eCrypto-Veatting-kenkejisku-programu-infiltruoja-pagrindines-\u201eJavaScript-bibliotekas-kurias-naudoja.jpg\",\"contentUrl\":\"https:\/\/dizainoarkliukas.lt\/wp-content\/uploads\/2025\/09\/\u201eCrypto-Veatting-kenkejisku-programu-infiltruoja-pagrindines-\u201eJavaScript-bibliotekas-kurias-naudoja.jpg\",\"width\":1201,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dizainoarkliukas.lt\/?p=3816#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dizainoarkliukas.lt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u201eCrypto Veatting\u201c kenk\u0117ji\u0161k\u0173 program\u0173 infiltruoja pagrindines \u201eJavaScript\u201c bibliotekas, kurias naudoja milijonai\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dizainoarkliukas.lt\/#website\",\"url\":\"https:\/\/dizainoarkliukas.lt\/\",\"name\":\"DizainoArkliukas.LT\",\"description\":\"Interneto technologijos, blok\u0173 grandin\u0117s, kripto turtas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dizainoarkliukas.lt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"lt-LT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dizainoarkliukas.lt\/#\/schema\/person\/df455e1ad6975b49e5033c007baf6d7c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\/\/dizainoarkliukas.lt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6323379efae0c70c686c7905444d6bbd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6323379efae0c70c686c7905444d6bbd?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/dizainoarkliukas.lt\"],\"url\":\"https:\/\/dizainoarkliukas.lt\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u201eCrypto Veatting\u201c kenk\u0117ji\u0161k\u0173 program\u0173 infiltruoja pagrindines \u201eJavaScript\u201c bibliotekas, kurias naudoja milijonai - DizainoArkliukas.LT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dizainoarkliukas.lt\/?p=3816","og_locale":"lt_LT","og_type":"article","og_title":"\u201eCrypto Veatting\u201c kenk\u0117ji\u0161k\u0173 program\u0173 infiltruoja pagrindines \u201eJavaScript\u201c bibliotekas, kurias naudoja milijonai - DizainoArkliukas.LT","og_description":"NPM (\u201eNode Packet Manager\u201c) k\u016br\u0117jo \u201eQix\u201c s\u0105skaita buvo pa\u017eeista, leid\u017eianti \u012fsilau\u017e\u0117liams paskelbti kenksmingas jo paket\u0173 versijas. U\u017epuolikai paskelb\u0117 kenksmingus de\u0161im\u010di\u0173&hellip;","og_url":"https:\/\/dizainoarkliukas.lt\/?p=3816","og_site_name":"DizainoArkliukas.LT","article_published_time":"2025-09-10T01:54:32+00:00","og_image":[{"url":"https:\/\/cryptopotato.com\/wp-content\/uploads\/2021\/01\/Malware-min.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minut\u0117s"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dizainoarkliukas.lt\/?p=3816#article","isPartOf":{"@id":"https:\/\/dizainoarkliukas.lt\/?p=3816"},"author":{"name":"admin","@id":"https:\/\/dizainoarkliukas.lt\/#\/schema\/person\/df455e1ad6975b49e5033c007baf6d7c"},"headline":"\u201eCrypto Veatting\u201c kenk\u0117ji\u0161k\u0173 program\u0173 infiltruoja pagrindines \u201eJavaScript\u201c bibliotekas, kurias naudoja milijonai","datePublished":"2025-09-10T01:54:32+00:00","mainEntityOfPage":{"@id":"https:\/\/dizainoarkliukas.lt\/?p=3816"},"wordCount":647,"image":{"@id":"https:\/\/dizainoarkliukas.lt\/?p=3816#primaryimage"},"thumbnailUrl":"https:\/\/dizainoarkliukas.lt\/wp-content\/uploads\/2025\/09\/\u201eCrypto-Veatting-kenkejisku-programu-infiltruoja-pagrindines-\u201eJavaScript-bibliotekas-kurias-naudoja.jpg","keywords":["bibliotekas","Crypto","infiltruoja","JavaScript","kenk\u0117ji\u0161k\u0173","kurias","milijonai","naudoja","pagrindin\u0117s","program\u0173","Veatting"],"articleSection":["KRIPTO TURTAS"],"inLanguage":"lt-LT"},{"@type":"WebPage","@id":"https:\/\/dizainoarkliukas.lt\/?p=3816","url":"https:\/\/dizainoarkliukas.lt\/?p=3816","name":"\u201eCrypto Veatting\u201c kenk\u0117ji\u0161k\u0173 program\u0173 infiltruoja pagrindines \u201eJavaScript\u201c bibliotekas, kurias naudoja milijonai - DizainoArkliukas.LT","isPartOf":{"@id":"https:\/\/dizainoarkliukas.lt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dizainoarkliukas.lt\/?p=3816#primaryimage"},"image":{"@id":"https:\/\/dizainoarkliukas.lt\/?p=3816#primaryimage"},"thumbnailUrl":"https:\/\/dizainoarkliukas.lt\/wp-content\/uploads\/2025\/09\/\u201eCrypto-Veatting-kenkejisku-programu-infiltruoja-pagrindines-\u201eJavaScript-bibliotekas-kurias-naudoja.jpg","datePublished":"2025-09-10T01:54:32+00:00","author":{"@id":"https:\/\/dizainoarkliukas.lt\/#\/schema\/person\/df455e1ad6975b49e5033c007baf6d7c"},"breadcrumb":{"@id":"https:\/\/dizainoarkliukas.lt\/?p=3816#breadcrumb"},"inLanguage":"lt-LT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dizainoarkliukas.lt\/?p=3816"]}]},{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/dizainoarkliukas.lt\/?p=3816#primaryimage","url":"https:\/\/dizainoarkliukas.lt\/wp-content\/uploads\/2025\/09\/\u201eCrypto-Veatting-kenkejisku-programu-infiltruoja-pagrindines-\u201eJavaScript-bibliotekas-kurias-naudoja.jpg","contentUrl":"https:\/\/dizainoarkliukas.lt\/wp-content\/uploads\/2025\/09\/\u201eCrypto-Veatting-kenkejisku-programu-infiltruoja-pagrindines-\u201eJavaScript-bibliotekas-kurias-naudoja.jpg","width":1201,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/dizainoarkliukas.lt\/?p=3816#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dizainoarkliukas.lt\/"},{"@type":"ListItem","position":2,"name":"\u201eCrypto Veatting\u201c kenk\u0117ji\u0161k\u0173 program\u0173 infiltruoja pagrindines \u201eJavaScript\u201c bibliotekas, kurias naudoja milijonai"}]},{"@type":"WebSite","@id":"https:\/\/dizainoarkliukas.lt\/#website","url":"https:\/\/dizainoarkliukas.lt\/","name":"DizainoArkliukas.LT","description":"Interneto technologijos, blok\u0173 grandin\u0117s, kripto turtas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dizainoarkliukas.lt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"lt-LT"},{"@type":"Person","@id":"https:\/\/dizainoarkliukas.lt\/#\/schema\/person\/df455e1ad6975b49e5033c007baf6d7c","name":"admin","image":{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/dizainoarkliukas.lt\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6323379efae0c70c686c7905444d6bbd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6323379efae0c70c686c7905444d6bbd?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/dizainoarkliukas.lt"],"url":"https:\/\/dizainoarkliukas.lt\/?author=1"}]}},"jetpack_featured_media_url":"https:\/\/dizainoarkliukas.lt\/wp-content\/uploads\/2025\/09\/\u201eCrypto-Veatting-kenkejisku-programu-infiltruoja-pagrindines-\u201eJavaScript-bibliotekas-kurias-naudoja.jpg","_links":{"self":[{"href":"https:\/\/dizainoarkliukas.lt\/index.php?rest_route=\/wp\/v2\/posts\/3816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dizainoarkliukas.lt\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dizainoarkliukas.lt\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dizainoarkliukas.lt\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dizainoarkliukas.lt\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3816"}],"version-history":[{"count":0,"href":"https:\/\/dizainoarkliukas.lt\/index.php?rest_route=\/wp\/v2\/posts\/3816\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dizainoarkliukas.lt\/index.php?rest_route=\/wp\/v2\/media\/3817"}],"wp:attachment":[{"href":"https:\/\/dizainoarkliukas.lt\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dizainoarkliukas.lt\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dizainoarkliukas.lt\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}