Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
React Native Packages Targeted by Credential-Stealing Malware

React Native Packages Targeted by Credential-Stealing Malware

Posted on March 17, 2026 By CWS

A significant security breach struck the developer community on March 16, 2026, when a malicious actor, identified as Glassworm, compromised two popular React Native npm packages. These packages were transformed into tools for stealing credentials and cryptocurrencies, causing widespread concern.

Details of the Compromised Packages

The affected npm packages, namely [email protected] and [email protected], were simultaneously published by the user AstrOOnauta. In the month leading to the attack, these packages were downloaded over 134,887 times, highlighting their extensive use in the developer ecosystem. Trusted for handling essential mobile UI components, they became inadvertent carriers of malware.

The malware activation required no special actions from users. A simple npm install command was sufficient to initiate the infection process. The attack leveraged a new preinstall hook within the packages, executing a heavily obfuscated JavaScript file, install.js, which made the malware installation seamless and undetectable during routine updates.

Execution and Impact of the Attack

The malware’s execution chain was meticulously crafted to remain concealed. Upon execution, install.js scanned systems for Russian language settings, halting if detected, a common tactic among Russian-speaking cybercriminals. If no such markers were found, the malware proceeded to query the Solana blockchain to retrieve a concealed URL for subsequent payload delivery.

This method, using a public blockchain as a relay, significantly hindered traditional blocking methods via domain or network filtering. The second stage script decrypted a third-stage payload, focusing on Windows systems. It established persistence using Windows Task Scheduler and registry keys while further components were fetched from attacker-controlled servers, targeting cryptocurrency wallets and developer credentials.

Response and Recommendations

In response to this breach, developers are urged to audit their systems for the affected package versions and treat compromised systems with utmost priority. Immediate actions include rotating npm tokens, GitHub credentials, and any exposed cryptocurrency wallet keys. Additionally, network logs should be scrutinized for suspicious connections to specific IP addresses linked to the attack.

To mitigate future risks, developers should review package lifecycle scripts and be vigilant about unexpected preinstall hooks in their build environments. These proactive measures can substantially reduce exposure to similar supply chain threats.

This incident underscores the importance of maintaining robust security practices in software development. Staying informed and prepared can help mitigate the impacts of such sophisticated cyber threats.

Cyber Security News Tags:Blockchain, credential theft, cyber attack, Cybersecurity, developer tools, GlassWorm, JavaScript, Malware, mobile development, NPM, package management, React Native, security breach, Software Security, supply chain attack

Post navigation

Previous Post: Tracebit Secures $20M to Enhance Cybersecurity Solutions
Next Post: AI Vulnerability Exposed Through Custom Font Attacks

Related Posts

CISA Highlights Notepad++ Vulnerability Amid Active Exploits CISA Highlights Notepad++ Vulnerability Amid Active Exploits Cyber Security News
Android Packer Ducex Employs Serious Obfuscation Techniques and Detects Analysis Tools Presence Android Packer Ducex Employs Serious Obfuscation Techniques and Detects Analysis Tools Presence Cyber Security News
Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution Cyber Security News
Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst Cyber Security News
Google Chrome RCE Vulnerability Details Released Along with Exploit Code Google Chrome RCE Vulnerability Details Released Along with Exploit Code Cyber Security News
Matryoshka Malware Targets macOS with New Stealer Variant Matryoshka Malware Targets macOS with New Stealer Variant Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Cyber Attacks Target US Networks, Cameras for Surveillance
  • AI Vulnerability Exposed Through Custom Font Attacks
  • React Native Packages Targeted by Credential-Stealing Malware
  • Tracebit Secures $20M to Enhance Cybersecurity Solutions
  • Ransomware Tactics Evolve Amid Declining Profits, Google Reports

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iranian Cyber Attacks Target US Networks, Cameras for Surveillance
  • AI Vulnerability Exposed Through Custom Font Attacks
  • React Native Packages Targeted by Credential-Stealing Malware
  • Tracebit Secures $20M to Enhance Cybersecurity Solutions
  • Ransomware Tactics Evolve Amid Declining Profits, Google Reports

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News