Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Npm Packages Exploit Crypto Keys and CI Secrets

Npm Packages Exploit Crypto Keys and CI Secrets

Posted on February 23, 2026 By CWS

Introduction to the Threat

Cybersecurity experts have raised alarms about a new threat involving a group of harmful npm packages designed to steal credentials and cryptocurrency keys. Named SANDWORM_MODE by security firm Socket, this attack leverages at least 19 malicious npm packages to infiltrate developer environments. The campaign mimics previous Shai-Hulud attacks, embedding code to extract system data, tokens, secrets, and API keys while using stolen npm and GitHub identities for further spread.

Details of the Malicious Campaign

The malicious packages were released by two npm aliases, official334 and javaorg. These packages include:

  • [email protected]
  • [email protected]
  • [email protected]

Additionally, four dormant packages that currently lack harmful capabilities were identified. The attack also employs a GitHub Action to extract CI/CD secrets via HTTPS with a DNS fallback, including a destructive feature that wipes home directories if access to GitHub and npm is lost.

Advanced Malware Features

A key component of the malware, known as “McpInject,” targets AI coding assistants by deploying a malicious server. This server pretends to be a genuine tool, embedding prompts to access sensitive files like ~/.ssh/id_rsa. Furthermore, the malware targets various coding tools and harvests API keys from several language model providers. The payload includes a polymorphic engine designed to evade detection by altering variables and control flow.

Stages of the Attack Chain

The attack unfolds in two stages. The initial phase captures credentials and crypto keys, while the second, activated after 48 hours, intensifies data harvesting and propagation. Developers are advised to uninstall the identified packages, rotate tokens, and scrutinize configuration files for unauthorized changes. Security firm Socket suggests the threat actors are enhancing their methods, as indicated by certain toggles that disable destructive routines.

Related Security Concerns

The disclosure coincides with reports from Veracode and JFrog about other malicious npm packages. These packages, like “buildrunner-dev” and “eslint-verify-plugin,” are designed to deploy remote access trojans across various operating systems. The .NET malware from “buildrunner-dev” and the complex infection chain from “eslint-verify-plugin” underline the sophisticated nature of these threats, prompting developers to be vigilant against npm package vulnerabilities.

The Hacker News Tags:AI coding, API tokens, CI secrets, crypto keys, Cybersecurity, GitHub, Malware, NPM, supply chain

Post navigation

Previous Post: North Korean Cybercriminals Intensify Crypto Attacks
Next Post: Romanian Hacker Admits to Selling Access to US State Network

Related Posts

Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation The Hacker News
A Look Inside Pillar’s AI Security Platform A Look Inside Pillar’s AI Security Platform The Hacker News
New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs The Hacker News
Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure The Hacker News
Why Early Threat Detection Is a Must for Long-Term Business Growth Why Early Threat Detection Is a Must for Long-Term Business Growth The Hacker News
Why Organizations Are Abandoning Static Secrets for Managed Identities Why Organizations Are Abandoning Static Secrets for Managed Identities The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UnsolicitedBooker Shifts Focus to Central Asian Telecoms
  • Spanish Crackdown on Anonymous Fénix Hackers
  • Cyber Group Claims Massive Data Breach at Odido
  • AI-Powered Cyber Attacks Target Global FortiGate Devices
  • Chinese AI Firms Accused of Copying Claude Using 16 Million Queries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UnsolicitedBooker Shifts Focus to Central Asian Telecoms
  • Spanish Crackdown on Anonymous Fénix Hackers
  • Cyber Group Claims Massive Data Breach at Odido
  • AI-Powered Cyber Attacks Target Global FortiGate Devices
  • Chinese AI Firms Accused of Copying Claude Using 16 Million Queries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News