Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm

Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm

Posted on November 13, 2025November 13, 2025 By CWS

A menace actor has revealed tens of hundreds of malicious NPM packages that include a self-replicating worm, safety researchers warn.

In contrast to latest provide chain assaults on NPM, the code used on this marketing campaign doesn’t steal credentials or information, however abuses the ecosystem for spam.

SourceCodeRed, which calls the malware ‘the IndonesianFoods worm’, has recognized over 43,900 malicious NPM packages related to 11 accounts, all named utilizing a scheme involving Indonesian names and meals.

The malicious code was designed to generate random names, modify the package deal.json recordsdata to make the packages public and add random model numbers, and publish the packages to the NPM registry.

In line with SourceCodeRed, the code repeats the identical steps in an infinite loop, publishing a brand new package deal each 7 seconds, always spamming the NPM registry.

“This floods the NPM registry with junk packages, wastes infrastructure assets, pollutes search outcomes, and creates provide chain dangers if builders by chance set up these malicious packages. The malware disguises itself as a official Subsequent.js utility to keep away from detection,” SourceCodeRed notes.

The exercise was additionally noticed by JFrog, which recognized over 80,000 self-replicating packages named utilizing an identical random title technology scheme. Along with the customized wordlist that features names and meals, the dictionary additionally makes use of adjectives, colours, and animal names.

In line with JFrog, which named the marketing campaign Large Purple, the malware reuses a sufferer consumer’s saved NPM credentials to publish newly generated packages to the registry at a quick tempo.Commercial. Scroll to proceed studying.

“The result’s a good, totally automated loop that may flood the npm ecosystem with giant numbers of superficially official packages, all derived from the identical code template and differentiated solely by randomized metadata,” JFrog notes.

The 80,000 malicious packages have been revealed throughout 18 consumer accounts and include solely the self-replicating publishing logic.

The precise goal of the marketing campaign stays unclear, however JFrog hypothesizes that it could possibly be “a dry run for a future marketing campaign the place the identical infrastructure and naming scheme could possibly be reused to ship actual malicious payloads for the campaigns with self-replicated code”.

Associated: Vital Flaw in In style React Native NPM Package deal Exposes Builders to Assaults

Associated: 136 NPM Packages Delivering Infostealers Downloaded 100,000 Occasions

Associated: NPM Infrastructure Abused in Phishing Marketing campaign Aimed toward Industrial and Electronics Companies

Associated: GitHub Boosting Safety in Response to NPM Provide Chain Assaults

Security Week News Tags:Distribute, Malicious, NPM, Packages, SelfReplicating, Tens, Thousands, Worm

Post navigation

Previous Post: Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data
Next Post: NHS Investigating Oracle EBS Hack Following Cl0p Ransomware Group Claim

Related Posts

Android Update Patches Critical Remote Code Execution Flaw Android Update Patches Critical Remote Code Execution Flaw Security Week News
High-Severity Vulnerabilities Patched by Ivanti and Zoom High-Severity Vulnerabilities Patched by Ivanti and Zoom Security Week News
Venice Security Secures M for Access Management Venice Security Secures $33M for Access Management Security Week News
Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw Security Week News
Global Effort Shuts Down Tycoon 2FA Phishing Network Global Effort Shuts Down Tycoon 2FA Phishing Network Security Week News
The AI Arms Race: Deepfake Generation vs. Detection The AI Arms Race: Deepfake Generation vs. Detection Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark