Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Supply Chain Worm Exploits npm to Steal Developer Tokens

Supply Chain Worm Exploits npm to Steal Developer Tokens

Posted on April 22, 2026 By CWS

Cybersecurity experts have identified a new security threat where npm packages are being exploited to distribute a self-propagating worm. This malware, flagged by Socket and StepSecurity, spreads by hijacking developer tokens and is being tracked under the name CanisterSprawl. The worm has similarities to TeamPCP’s CanisterWorm, using an ICP canister to enhance resilience against takedowns.

Affected Packages and Propagation Techniques

The compromised packages include @automagik/genie, @fairwords/loopback-connector-es, @fairwords/websocket, @openwebconcept/design-tokens, @openwebconcept/theme-owc, and pgserve. Malicious actors have used a post-install hook to steal credentials and secrets from developer environments. These stolen npm tokens are then used to distribute altered package versions, expanding the malware’s reach.

The information targeted includes configuration files such as .npmrc, SSH keys, and cloud credentials from major providers. Additionally, the malware seeks credentials from Chromium-based browsers and cryptocurrency extensions, sending the data to both an HTTPS webhook and an ICP canister.

Broader Implications and Similar Attacks

This attack is part of a broader pattern affecting the open-source ecosystem. Notably, a legitimate Python package named xinference was also compromised to deliver a Base64-encoded payload for collecting credentials. TeamPCP, which has been associated with past security breaches, has denied involvement, suggesting a copycat operation may be at play.

In a related development, attacks on npm and PyPI have been observed where packages disguise themselves as Kubernetes utilities to execute unauthorized actions. These malicious packages can establish various proxies and servers on infected machines, highlighting the persistent threat to open-source platforms.

Future Outlook and Mitigation Strategies

As the threat landscape evolves, effective mitigation strategies are crucial. Recently, Google-owned Wiz exposed an AI-powered attack campaign exploiting GitHub Actions to extract developer credentials. While such attacks demonstrate vulnerabilities in the CI/CD pipeline, adherence to modern security practices, including contributor approval processes, can mitigate risks.

The ongoing threat underscores the importance of vigilance and robust security measures in the software development lifecycle. Developers and security teams must stay informed and proactive to protect against these sophisticated supply chain attacks.

The Hacker News Tags:AI-powered attacks, Cybersecurity, developer tokens, GitHub, Malware, NPM, open source security, PyPI, supply chain attack, TeamPCP

Post navigation

Previous Post: Auraboros RAT Unveiled: Live Surveillance and Data Theft
Next Post: Essential Phishing Defense Strategies for CISOs

Related Posts

Enhancing Windows Security: Tackling MFA and Credential Risks Enhancing Windows Security: Tackling MFA and Credential Risks The Hacker News
Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise The Hacker News
Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU The Hacker News
How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes The Hacker News
SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw The Hacker News
Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Crypto Users Targeted by Fake Google Ads and Wallet Drainers
  • French Fintech Accounts Abused by Cybercriminals for Money Laundering
  • Warning on Malicious KICS Docker Images and Extensions
  • Essential Phishing Defense Strategies for CISOs
  • Supply Chain Worm Exploits npm to Steal Developer Tokens

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Crypto Users Targeted by Fake Google Ads and Wallet Drainers
  • French Fintech Accounts Abused by Cybercriminals for Money Laundering
  • Warning on Malicious KICS Docker Images and Extensions
  • Essential Phishing Defense Strategies for CISOs
  • Supply Chain Worm Exploits npm to Steal Developer Tokens

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark