Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CanisterWorm Exploits Trivy Attack, Targets npm Packages

CanisterWorm Exploits Trivy Attack, Targets npm Packages

Posted on March 21, 2026 By CWS

A significant supply chain attack has emerged, compromising the renowned Trivy scanner and affecting several npm packages with a new self-propagating malware known as CanisterWorm. This cyber threat capitalizes on the ICP canister, a tamper-proof smart contract on the Internet Computer blockchain, to execute its malicious activities. The attack signifies the first known exploitation of an ICP canister for accessing command-and-control (C2) servers, as reported by Charlie Eriksen, a researcher at Aikido Security.

Details of the Supply Chain Compromise

The breach has impacted numerous npm packages, including 28 from the @EmilGroup scope, 16 from the @opengov scope, and others like @teale.io/eslint-config and @airtm/uuid-base32. This incident follows the compromise of credentials used to release malicious versions of Trivy, trivy-action, and setup-trivy, which contained a credential-stealing component. The cybercriminal group TeamPCP is suspected to be orchestrating these attacks.

The infection process involves the use of a postinstall hook to deploy a loader that plants a Python backdoor. This backdoor communicates with the ICP canister to obtain a URL leading to further payloads. The decentralized nature of the canister’s infrastructure makes it resistant to takedown attempts, enhancing its persistence.

Mechanics of CanisterWorm’s Propagation

Persistence is maintained through a systemd user service, which automatically restarts the Python backdoor. This service disguises itself as PostgreSQL tooling to avoid detection. Every 50 minutes, the backdoor contacts the ICP canister using a spoofed User-Agent to fetch a URL. If the URL includes youtube[.]com, the script remains inactive. The attacker can activate the malware by directing the canister to a legitimate binary, and deactivate it by reverting to a YouTube link.

The ICP canister supports various functions like get_latest_link and update_link, enabling the attacker to modify its operations. Additionally, the worm’s propagation is facilitated by a “deploy.js” file, which the attacker manually executes to expand the payload across accessible npm packages using stolen tokens.

Evolving Threat and Future Implications

Recent updates to the CanisterWorm, particularly in “@teale.io/eslint-config” versions 1.8.11 and 1.8.12, enable self-propagation without manual input. The new variant integrates its functionality within “index.js,” utilizing npm authentication tokens from compromised machines to spread the malware autonomously.

This development signifies a shift from isolated account compromises to widespread malware propagation. Developers and CI pipelines with exposed npm tokens inadvertently become vectors for further infection. The attackers have tested this mechanism using a dummy payload, likely to confirm its effectiveness before deploying the actual malware.

As this cyber threat evolves, it underscores the critical need for vigilant monitoring of software dependencies and enhanced credential security to prevent further breaches in the supply chain. Stakeholders are advised to stay updated as more information becomes available.

The Hacker News Tags:CanisterWorm, cyber threat, Cybersecurity, ICP canister, Malware, npm packages, Python backdoor, supply chain attack, TeamPCP, Trivy

Post navigation

Previous Post: FBI and CISA Alert on Russian Phishing Targeting Signal
Next Post: CISA Urges Patching of Apple and CMS Vulnerabilities

Related Posts

MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE and Upgraded ANEL Malware The Hacker News
HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass The Hacker News
Fortinet Updates Fix Major SQL Injection Vulnerability Fortinet Updates Fix Major SQL Injection Vulnerability The Hacker News
Navigating Cybersecurity Amidst Constant Instability Navigating Cybersecurity Amidst Constant Instability The Hacker News
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts The Hacker News
North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Quest KACE Security Flaw Potentially Exploited by Hackers
  • Oracle Resolves Critical RCE Vulnerability in Identity Manager
  • Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft
  • CISA Urges Patching of Apple and CMS Vulnerabilities
  • CanisterWorm Exploits Trivy Attack, Targets npm Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Quest KACE Security Flaw Potentially Exploited by Hackers
  • Oracle Resolves Critical RCE Vulnerability in Identity Manager
  • Trivy GitHub Attack Exposes CI/CD Pipelines to Credential Theft
  • CISA Urges Patching of Apple and CMS Vulnerabilities
  • CanisterWorm Exploits Trivy Attack, Targets npm Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark