Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PylangGhost RAT Targets Developers via npm Packages

PylangGhost RAT Targets Developers via npm Packages

Posted on March 17, 2026 By CWS

A new cyber threat has emerged as PylangGhost, a remote access trojan, makes its debut on the npm registry, hidden within two harmful JavaScript packages. This marks a notable rise in software supply chain attacks, with developers worldwide now at risk.

Background on PylangGhost and FAMOUS CHOLLIMA

First disclosed by Cisco Talos in June 2025, PylangGhost is attributed to the North Korean state-sponsored group FAMOUS CHOLLIMA. Known for targeting developers via trojanized repositories and social engineering, this group has now moved to npm, a popular open-source package registry, aiming to compromise development pipelines on a larger scale.

Researchers from Kmsec.uk identified two malicious packages, @jaime9008/math-service and react-refresh-update, published by the user jaime9008. These packages, appearing in late February and early March 2026, respectively, contained the PylangGhost loader within key JavaScript files.

Technical Details of the Attack

The malware’s campaign identifier, “ML2J,” and its command-and-control infrastructure, using the domain malicanbur[.]pro, highlight its sophistication. Any developer installing these packages might have unknowingly compromised their system, as the malware operates silently, evading detection.

This threat extends beyond individual developers; since npm packages are integral to large projects and CI/CD pipelines, a single infected dependency can jeopardize entire organizations. Using misleading package names like react-refresh-update exacerbates the risk, as such threats evade routine checks.

Infection Mechanics and Mitigation

The infection mechanism is designed to operate quietly across various systems, including Windows, macOS, and Linux. Upon installation, a JavaScript loader executes a decode-decrypt-evaluate sequence using a specific XOR key to unlock the payload.

On Windows, the malware downloads a ZIP archive in fragments to avoid detection, while for macOS and Linux, it deploys an executable shell script. The RAT can extract Chrome extension IDs, granting attackers access to sensitive data.

Developers and security teams must audit their npm dependencies for the compromised packages and block traffic to malicanbur[.]pro. Employing software composition analysis tools can preemptively catch such threats, and any unusual network activity should be investigated promptly.

Staying updated on cybersecurity threats is crucial. Follow us on Google News, LinkedIn, and X for real-time updates and set CSN as your preferred source on Google.

Cyber Security News Tags:cyber threat, Cybersecurity, FAMOUS CHOLLIMA, JavaScript, Malware, North Korea, npm packages, PyLangGhost, remote access trojan, software development, software supply chain

Post navigation

Previous Post: RondoDox Botnet Expands to 174 Vulnerabilities
Next Post: Intuitive Reports Cyberattack Affecting Data Security

Related Posts

Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files Cyber Security News
Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users Cyber Security News
Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely Cyber Security News
Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Cyber Security News
10 Best Cloud Monitoring Tools in 2025 10 Best Cloud Monitoring Tools in 2025 Cyber Security News
Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Tech Leaders Fund $12.5M for Open Source Security Boost
  • Windows 11 Update Resolves Bluetooth Visibility Bug
  • Security Flaw in UK Companies House Web Application Exposed
  • LeakNet Ransomware Adopts ClickFix for Attacks
  • Critical Kubernetes NFS Driver Flaw Exposes Server Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Tech Leaders Fund $12.5M for Open Source Security Boost
  • Windows 11 Update Resolves Bluetooth Visibility Bug
  • Security Flaw in UK Companies House Web Application Exposed
  • LeakNet Ransomware Adopts ClickFix for Attacks
  • Critical Kubernetes NFS Driver Flaw Exposes Server Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News