Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack

20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack

Posted on September 9, 2025September 9, 2025 By CWS

Sep 09, 2025Ravie LakshmananCryptocurrency / Software program Safety

A number of npm packages have been compromised as a part of a software program provide chain assault after a maintainer’s account was compromised in a phishing assault.

The assault focused Josh Junon (aka Qix), who acquired an electronic mail message that mimicked npm (“assist@npmjs[.]assist”), urging them to replace their replace their two-factor authentication (2FA) credentials earlier than September 10, 2025, by clicking on embedded hyperlink.

The phishing web page is alleged to have prompted the co-maintainer to enter their username, password, and two-factor authentication (2FA) token, just for it to be stolen possible by way of an adversary-in-the-middle (AitM) assault and used to publish the rogue model to the npm registry.

The next 20 packages, which collectively entice over 2 billion weekly downloads, have been confirmed as affected as a part of the incident –

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

“Sorry everybody, I ought to have paid extra consideration,” Junon mentioned in a put up on Bluesky. “Not like me; have had a worrying week. Will work to get this cleaned up.”

An evaluation of the obfuscated malware injected into the supply code reveals that it is designed to intercept cryptocurrency transaction requests and swap the vacation spot pockets tackle with an attacker-controlled pockets that carefully matches it by computing the Levenshtein distance.

In line with Aikido Safety’s Charlie Eriksen, the payload acts as a browser-based interceptor that hijacks community site visitors and software APIs to steal cryptocurrency property by rewriting requests and responses. It is presently not identified who’s behind the assault.

“The payload begins by checking typeof window !== ‘undefined’ to substantiate it’s working in a browser,” Socket mentioned. “It then hooks into window.fetch, XMLHttpRequest, and window.ethereum.request, together with different pockets supplier APIs.”

“This implies the malware targets finish customers with linked wallets who go to a web site that features the compromised code. Builders should not inherently the goal, but when they open an affected web site in a browser and join a pockets, they too change into victims.”

Package deal ecosystems like npm and the Python Package deal Index (PyPI) stay recurring targets as a result of their reputation and broad attain inside the developer group, with attackers abusing the belief related to these platforms to push malicious payloads.

Past publishing malicious packages immediately, attackers have additionally employed strategies akin to typosquatting and even exploiting AI-hallucinated dependencies – known as slopsquatting – to trick builders into putting in malware. The incident as soon as signifies the necessity for exercising vigilance and hardening CI/CD pipelines and locking down dependencies.

In line with ReversingLabs’ 2025 Software program Provide Chain Safety Report, 14 of the 23 crypto-related malicious campaigns in 2024 focused npm, with the rest linked to PyPI.

“What we’re seeing unfold with the npm packages chalk and debug is an sadly widespread occasion at present within the software program provide chain,” Ilkka Turunen, Subject CTO at Sonatype, informed The Hacker Information.

“The malicious payload was targeted on crypto theft, however this takeover follows a basic assault that’s now established – by taking on well-liked open supply packages, adversaries can steal secrets and techniques, depart behind backdoors and infiltrate organizations.”

“It was not a random alternative to focus on the developer of those packages. Package deal takeovers at the moment are a regular tactic for superior persistent menace teams like Lazarus, as a result of they know they’ll attain a considerable amount of the world’s developer inhabitants by infiltrating a single under-resourced undertaking.”

The Hacker News Tags:Attack, Billion, Chain, Compromised, Downloads, NPM, Packages, Popular, Supply, Weekly

Post navigation

Previous Post: Hackers Hijacked 18 Very Popular npm Packages With 2 Billion Weekly Downloads
Next Post: Hackers Accessed Customer Data From Salesforce

Related Posts

Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response The Hacker News
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs The Hacker News
Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month The Hacker News
NSO Group Fined 8M for Targeting 1,400 WhatsApp Users With Pegasus Spyware NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware The Hacker News
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale The Hacker News
Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark