Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New npm Attack Targets Developers with Hidden Malware

New npm Attack Targets Developers with Hidden Malware

Posted on March 26, 2026 By CWS

A sophisticated software supply chain attack has emerged, targeting developers through the npm package registry. This campaign employs fake installation messages to mask malicious activities, posing significant risks to developer systems.

The Ghost Campaign Unveiled

Security researchers have identified this campaign, dubbed the ‘Ghost campaign,’ which commenced in early February 2026. It involves npm packages designed to trick developers into divulging system credentials while secretly deploying a remote access trojan (RAT).

Upon installing one of these packages, developers see what appears to be a typical npm installation. The process includes log messages, a progress bar, and deliberate delays, creating an illusion of legitimacy. However, the packages listed for download do not exist; their names are randomly generated from a hardcoded list, making it challenging even for seasoned developers to detect the deception.

Technical Insights and Package Details

ReversingLabs analysts discovered the malicious activities tied to seven npm packages, all published by a user named ‘mikilanjillo.’ The flagged packages include ‘react-performance-suite,’ ‘react-state-optimizer-core,’ ‘react-fast-utilsa,’ ‘ai-fast-auto-trader,’ ‘pkgnewfefame1,’ ‘carbon-mac-copy-cloner,’ and ‘coinbase-desktop-sdk.’

The campaign’s innovative use of fake installation logs represents a novel approach, highlighting a shift in tactics by threat actors to avoid detection in open-source environments. The final stage of the attack involves a RAT designed to steal cryptocurrency wallets and sensitive data, executed with remote commands from an attacker-controlled server.

Persistent Threat and Protective Measures

The campaign’s scope extends beyond the initially identified packages. In March 2026, JFrog documented a similar campaign named GhostClaw, sharing techniques and infrastructure with the Ghost campaign. Analysis by Jamf Threat Labs revealed the spread of this threat through GitHub repositories masked as legitimate developer tools.

This campaign’s most deceptive tactic involves tricking developers into entering their sudo password. During installation, fake error messages prompt users to provide root access, making the request appear routine. Once the password is entered, the malware downloader operates unnoticed, retrieving payload URLs and decryption keys from a Telegram channel.

Developers are urged never to enter sudo passwords when prompted by npm packages. They should verify package authors and repository histories and utilize automated security scanning tools to detect suspicious scripts. Organizations should enforce stringent dependency review workflows and treat password prompts during software installs as red flags.

Staying vigilant and informed about these threats is crucial as cyber attackers continue to evolve their methods. By implementing robust security measures, developers and organizations can better protect their systems from such sophisticated attacks.

Cyber Security News Tags:Cybersecurity, Developers, fake logs, Malware, NPM, Open Source, RAT, ReversingLabs, sudo phishing, supply chain

Post navigation

Previous Post: Phishing Attack Exploits GitHub Alerts to Distribute Malware
Next Post: WebRTC Skimmer Evades CSP to Steal E-Commerce Data

Related Posts

Multiple Ivanti Endpoint Manager Vulnerabilities Allows Remote Code Execution Multiple Ivanti Endpoint Manager Vulnerabilities Allows Remote Code Execution Cyber Security News
Microsoft Teams Mobile Update Prompts for Browser Choice Microsoft Teams Mobile Update Prompts for Browser Choice Cyber Security News
Apple Font Parser Vulnerability Enables Malicious Fonts to Crash or Corrupt Process Memory Apple Font Parser Vulnerability Enables Malicious Fonts to Crash or Corrupt Process Memory Cyber Security News
Cisco Desk, IP, and Video Phone Vulnerabilities Let Remote Attackers Trigger DoS And XSS Attacks Cisco Desk, IP, and Video Phone Vulnerabilities Let Remote Attackers Trigger DoS And XSS Attacks Cyber Security News
New ClickFix Attack Uses Fake BBC News Page and Fraudulent Cloudflare Verification to Trick Users New ClickFix Attack Uses Fake BBC News Page and Fraudulent Cloudflare Verification to Trick Users Cyber Security News
New “123 | Stealer” Advertised on Underground Hacking Forums for 0 Per Month New “123 | Stealer” Advertised on Underground Hacking Forums for $120 Per Month Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Identifies First AI-Created Zero-Day Exploit
  • Linux Rootkit and macOS Crypto Stealer Dominate Headlines
  • Hackers Exploit JPEG Files to Spread Malware
  • Skoda Online Shop Faces Significant Data Breach
  • Enhancing Security: The Rise of Autonomous Purple Teaming

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Identifies First AI-Created Zero-Day Exploit
  • Linux Rootkit and macOS Crypto Stealer Dominate Headlines
  • Hackers Exploit JPEG Files to Spread Malware
  • Skoda Online Shop Faces Significant Data Breach
  • Enhancing Security: The Rise of Autonomous Purple Teaming

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark