Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New npm Attack Targets Developers with Hidden Malware

New npm Attack Targets Developers with Hidden Malware

Posted on March 26, 2026 By CWS

A sophisticated software supply chain attack has emerged, targeting developers through the npm package registry. This campaign employs fake installation messages to mask malicious activities, posing significant risks to developer systems.

The Ghost Campaign Unveiled

Security researchers have identified this campaign, dubbed the ‘Ghost campaign,’ which commenced in early February 2026. It involves npm packages designed to trick developers into divulging system credentials while secretly deploying a remote access trojan (RAT).

Upon installing one of these packages, developers see what appears to be a typical npm installation. The process includes log messages, a progress bar, and deliberate delays, creating an illusion of legitimacy. However, the packages listed for download do not exist; their names are randomly generated from a hardcoded list, making it challenging even for seasoned developers to detect the deception.

Technical Insights and Package Details

ReversingLabs analysts discovered the malicious activities tied to seven npm packages, all published by a user named ‘mikilanjillo.’ The flagged packages include ‘react-performance-suite,’ ‘react-state-optimizer-core,’ ‘react-fast-utilsa,’ ‘ai-fast-auto-trader,’ ‘pkgnewfefame1,’ ‘carbon-mac-copy-cloner,’ and ‘coinbase-desktop-sdk.’

The campaign’s innovative use of fake installation logs represents a novel approach, highlighting a shift in tactics by threat actors to avoid detection in open-source environments. The final stage of the attack involves a RAT designed to steal cryptocurrency wallets and sensitive data, executed with remote commands from an attacker-controlled server.

Persistent Threat and Protective Measures

The campaign’s scope extends beyond the initially identified packages. In March 2026, JFrog documented a similar campaign named GhostClaw, sharing techniques and infrastructure with the Ghost campaign. Analysis by Jamf Threat Labs revealed the spread of this threat through GitHub repositories masked as legitimate developer tools.

This campaign’s most deceptive tactic involves tricking developers into entering their sudo password. During installation, fake error messages prompt users to provide root access, making the request appear routine. Once the password is entered, the malware downloader operates unnoticed, retrieving payload URLs and decryption keys from a Telegram channel.

Developers are urged never to enter sudo passwords when prompted by npm packages. They should verify package authors and repository histories and utilize automated security scanning tools to detect suspicious scripts. Organizations should enforce stringent dependency review workflows and treat password prompts during software installs as red flags.

Staying vigilant and informed about these threats is crucial as cyber attackers continue to evolve their methods. By implementing robust security measures, developers and organizations can better protect their systems from such sophisticated attacks.

Cyber Security News Tags:Cybersecurity, Developers, fake logs, Malware, NPM, Open Source, RAT, ReversingLabs, sudo phishing, supply chain

Post navigation

Previous Post: Phishing Attack Exploits GitHub Alerts to Distribute Malware
Next Post: WebRTC Skimmer Evades CSP to Steal E-Commerce Data

Related Posts

Evasive Panda APT Using AitM Attack and DNS Poisoning to Deliver Malware Evasive Panda APT Using AitM Attack and DNS Poisoning to Deliver Malware Cyber Security News
New Attack Technique Tricks AI Browsers Using a Simple ‘#’ New Attack Technique Tricks AI Browsers Using a Simple ‘#’ Cyber Security News
Critical Microsoft Office Vulnerabilities Let Attackers Execute malicious Code Critical Microsoft Office Vulnerabilities Let Attackers Execute malicious Code Cyber Security News
New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords Cyber Security News
Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials Cyber Security News
OWASP Top 10 2025 – Revised Version Released With Two New Categories OWASP Top 10 2025 – Revised Version Released With Two New Categories Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese Cyber Threats Breach Global Telecom Systems
  • Validate Security Measures Against Real Threats
  • Critical Cisco Firewall Flaw Enables Remote Code Execution
  • Coruna iOS Kit Revives 2023 Exploits in New Attacks
  • Critical Flaw in Synology DSM Risks Remote Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chinese Cyber Threats Breach Global Telecom Systems
  • Validate Security Measures Against Real Threats
  • Critical Cisco Firewall Flaw Enables Remote Code Execution
  • Coruna iOS Kit Revives 2023 Exploits in New Attacks
  • Critical Flaw in Synology DSM Risks Remote Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark