Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious npm Package with 206k Downloads Attacking GitHub-Owned Repositories to Exfiltrate Tokens

Malicious npm Package with 206k Downloads Attacking GitHub-Owned Repositories to Exfiltrate Tokens

Posted on November 14, 2025November 14, 2025 By CWS

On November seventh, safety researchers found a harmful malicious npm package deal known as “@acitons/artifact” that had already been downloaded greater than 206,000 occasions.

The package deal was designed to seem like the professional “@actions/artifact” package deal utilized by builders constructing instruments with GitHub Actions.

This was a basic typosquatting assault the place the attackers swapped the letters to make the title seem appropriate at first look.

The malware’s purpose was clear and centered. When this package deal was put in throughout a construct course of in GitHub-owned repositories, it could steal authentication tokens accessible within the construct surroundings.

With these tokens, attackers may then publish new malicious code immediately from GitHub’s personal account, making a critical menace to your complete platform’s safety.

The assault labored by way of a hidden set up script embedded within the package deal. Particularly, six variations of the malicious package deal included a post-install hook that routinely downloaded and ran hidden malware code.

Veracode safety analysts recognized that this malware was not detected by widespread antivirus software program when first found, making it particularly harmful to organizations counting on these safety instruments.

This marketing campaign highlights a crucial vulnerability within the software program provide chain, which is why it ranked because the third most vital safety concern within the OWASP High 10 2025 listing.

The assault focused GitHub’s steady integration and steady deployment platform, displaying how criminals are more and more specializing in the instruments that builders belief each day.

Veracode safety researchers famous that the malware used intelligent strategies to cover its true habits and keep away from automated detection.

Malicious code

The malicious code was obfuscated and compiled utilizing particular instruments that convert shell scripts into binary information, making it tougher to investigate.

The package deal contained a selected mechanism to cease working after a sure date, with every model set to run out inside days of launch.

This time-based set off suggests the attackers had been testing completely different variations of their code whereas staying hidden from safety programs.

The an infection mechanism labored in phases. When put in, the malware executed as a bash script that reset its personal surroundings variables to alter the way it ran.

This triggered the loading of an obfuscated file known as “confirm.js” hidden inside a Node package deal. The confirm.js file contained checks for particular GitHub surroundings variables that solely exist when code runs inside GitHub Actions.

The code particularly focused solely repositories owned by the GitHub group itself, confirming this was a precision assault.

The malware obtained an encryption key from an exterior server, encrypted the stolen tokens, after which despatched this encrypted knowledge to a command and management server.

Builders utilizing Veracode’s Package deal Firewall had been protected against this menace instantly after the invention, however the incident demonstrates how susceptible package deal managers stay to those refined provide chain assaults.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:206k, Attacking, Downloads, Exfiltrate, GitHubOwned, Malicious, NPM, Package, Repositories, Tokens

Post navigation

Previous Post: In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
Next Post: CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls

Related Posts

Critical Apple 0-Day Vulnerability Actively Exploited in the Wild Critical Apple 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks Cyber Security News
Cloudflare Discloses Technical Details Behind Massive Outage that Breaks the Internet Cloudflare Discloses Technical Details Behind Massive Outage that Breaks the Internet Cyber Security News
New Malware Uses Fake CAPTCHAs to Steal Information New Malware Uses Fake CAPTCHAs to Steal Information Cyber Security News
Cisco IMC Vulnerability Attackers to Access Internal Services with Elevated Privileges Cisco IMC Vulnerability Attackers to Access Internal Services with Elevated Privileges Cyber Security News
Urgent Alert: Craft CMS Vulnerability Under Attack Urgent Alert: Craft CMS Vulnerability Under Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark