Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious npm Package with 206k Downloads Attacking GitHub-Owned Repositories to Exfiltrate Tokens

Malicious npm Package with 206k Downloads Attacking GitHub-Owned Repositories to Exfiltrate Tokens

Posted on November 14, 2025November 14, 2025 By CWS

On November seventh, safety researchers found a harmful malicious npm package deal known as “@acitons/artifact” that had already been downloaded greater than 206,000 occasions.

The package deal was designed to seem like the professional “@actions/artifact” package deal utilized by builders constructing instruments with GitHub Actions.

This was a basic typosquatting assault the place the attackers swapped the letters to make the title seem appropriate at first look.

The malware’s purpose was clear and centered. When this package deal was put in throughout a construct course of in GitHub-owned repositories, it could steal authentication tokens accessible within the construct surroundings.

With these tokens, attackers may then publish new malicious code immediately from GitHub’s personal account, making a critical menace to your complete platform’s safety.

The assault labored by way of a hidden set up script embedded within the package deal. Particularly, six variations of the malicious package deal included a post-install hook that routinely downloaded and ran hidden malware code.

Veracode safety analysts recognized that this malware was not detected by widespread antivirus software program when first found, making it particularly harmful to organizations counting on these safety instruments.

This marketing campaign highlights a crucial vulnerability within the software program provide chain, which is why it ranked because the third most vital safety concern within the OWASP High 10 2025 listing.

The assault focused GitHub’s steady integration and steady deployment platform, displaying how criminals are more and more specializing in the instruments that builders belief each day.

Veracode safety researchers famous that the malware used intelligent strategies to cover its true habits and keep away from automated detection.

Malicious code

The malicious code was obfuscated and compiled utilizing particular instruments that convert shell scripts into binary information, making it tougher to investigate.

The package deal contained a selected mechanism to cease working after a sure date, with every model set to run out inside days of launch.

This time-based set off suggests the attackers had been testing completely different variations of their code whereas staying hidden from safety programs.

The an infection mechanism labored in phases. When put in, the malware executed as a bash script that reset its personal surroundings variables to alter the way it ran.

This triggered the loading of an obfuscated file known as “confirm.js” hidden inside a Node package deal. The confirm.js file contained checks for particular GitHub surroundings variables that solely exist when code runs inside GitHub Actions.

The code particularly focused solely repositories owned by the GitHub group itself, confirming this was a precision assault.

The malware obtained an encryption key from an exterior server, encrypted the stolen tokens, after which despatched this encrypted knowledge to a command and management server.

Builders utilizing Veracode’s Package deal Firewall had been protected against this menace instantly after the invention, however the incident demonstrates how susceptible package deal managers stay to those refined provide chain assaults.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:206k, Attacking, Downloads, Exfiltrate, GitHubOwned, Malicious, NPM, Package, Repositories, Tokens

Post navigation

Previous Post: In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
Next Post: CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls

Related Posts

October Sees Rise in Phishing and Ransomware Attacks, Including TyKit and Google Careers Scams October Sees Rise in Phishing and Ransomware Attacks, Including TyKit and Google Careers Scams Cyber Security News
Spam Campaign Utilizes Fake PDFs for Remote Access Spam Campaign Utilizes Fake PDFs for Remote Access Cyber Security News
New Spear-Phishing Attack Targeting Security Individuals in Israel Region New Spear-Phishing Attack Targeting Security Individuals in Israel Region Cyber Security News
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Cyber Security News
ASUS MyASUS Flaw Lets Hackers Escalate to SYSTEM-Level Access ASUS MyASUS Flaw Lets Hackers Escalate to SYSTEM-Level Access Cyber Security News
Critical React Router Vulnerability Let Attackers Access or Modify Server Files Critical React Router Vulnerability Let Attackers Access or Modify Server Files Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News