Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight

Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight

Posted on June 9, 2025June 9, 2025 By CWS

A complicated provide chain assault has compromised 16 standard React Native packages with over a million mixed weekly downloads, marking a big escalation in ongoing NPM ecosystem threats.

The assault, which started on June sixth, 2025, systematically backdoored packages throughout the React Native Aria ecosystem and GlueStack framework, deploying superior distant entry trojans (RATs) able to establishing persistent system management and information exfiltration capabilities.

The assault commenced at 21:33 PM GMT on June sixth when model 0.2.10 of @react-native-aria/focus was launched, marking the primary compromise in what would change into a coordinated in a single day assault.

@react-native-aria (Supply – Aikido)

This preliminary bundle had not been up to date since October 18th, 2023, making the sudden model launch notably suspicious to safety monitoring techniques.

The attackers employed subtle whitespace-based obfuscation strategies to cover malicious code throughout the lib/commonjs/index.js file, pushing the precise payload off-screen in customary code editors with out phrase wrapping capabilities.

Following the preliminary compromise, the menace actors systematically focused further packages all through the evening and into the next day, compromising standard libraries together with @react-native-aria/utils, @react-native-aria/overlays, @react-native-aria/interactions, and finally extending their attain to @gluestack-ui/utils.

Aikido analysts recognized this as a continuation of earlier assaults in opposition to the rand-user-agent bundle, noting the deployment of almost equivalent payload constructions with enhanced capabilities.

The malware represents a big evolution from earlier provide chain assaults, that includes twin command-and-control infrastructure and enhanced reconnaissance capabilities.

The attackers demonstrated outstanding persistence and coordination, finishing the compromise of all 16 packages inside roughly 17 hours, suggesting both automated tooling or a well-coordinated crew effort.

The mixed attain of those packages, serving over a million weekly downloads, offers the attackers with an unprecedented assault floor throughout the React Native improvement ecosystem.

Obfuscation and Payload Supply Mechanisms

The attackers employed a classy multi-layered strategy to payload supply, starting with whitespace-based obfuscation that renders malicious code invisible in most improvement environments.

The first payload, inserted at line 46 of the compromised index.js recordsdata, seems as innocuous whitespace however comprises the next obfuscated code:-

international[‘_V’]=’8-npm13′;international[‘r’]=require; (f

This payload establishes the muse for a complete RAT deployment that makes use of the worldwide namespace to keep up persistence and set up communication channels.

The malware instantly captures system data together with platform particulars, hostname, username, and system structure via Node.js built-in modules.

The assault demonstrates superior evasion strategies by leveraging version-based C2 server choice, with the payload containing logic to decide on between a number of command-and-control endpoints primarily based on the deployment model.

The malware establishes persistence on Home windows techniques via the %LOCALAPPDATApercentProgramsPythonPython3127 listing, mimicking reliable Python installations to keep away from detection.

Moreover, the RAT consists of enhanced reconnaissance capabilities with new instructions reminiscent of ss_info for system metadata assortment and ss_ip for exterior IP enumeration, indicating the attackers’ give attention to complete environmental consciousness and potential lateral motion preparation.

Pace up and enrich menace investigations with Risk Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Beware, Compromised, Developers, Download, Million, Native, Overnight, Packages, React

Post navigation

Previous Post: Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign
Next Post: Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’

Related Posts

Threat Actors Deploying CoinMiner Malware via USB Drives Infecting Workstations Threat Actors Deploying CoinMiner Malware via USB Drives Infecting Workstations Cyber Security News
CISA releases Secure Connectivity Principles Checklist for Operational Technology Networks Connectivity CISA releases Secure Connectivity Principles Checklist for Operational Technology Networks Connectivity Cyber Security News
New 0-Click Vulnerability Threatens Claude Desktop Users New 0-Click Vulnerability Threatens Claude Desktop Users Cyber Security News
Malicious PyPI Package Mimic as Popular Sympy-Dev to Attack Millions of Users Malicious PyPI Package Mimic as Popular Sympy-Dev to Attack Millions of Users Cyber Security News
Hackers Allegedly Claim Breach of Mercedes-Benz USA Legal and Customer Data Hackers Allegedly Claim Breach of Mercedes-Benz USA Legal and Customer Data Cyber Security News
Hackers Exploit Critical WebLogic RCE Flaw Rapidly Hackers Exploit Critical WebLogic RCE Flaw Rapidly Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark