Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

136 NPM Packages Delivering Infostealers Downloaded 100,000 Times

Posted on October 30, 2025October 30, 2025 By CWS

For the previous 4 months, over 130 malicious NPM packages deploying data stealers have been collectively downloaded roughly 100,000 instances, safety researchers warn.

A complete of 136 NPM packages partaking within the malicious conduct have been recognized, as a part of two totally different operations which have been energetic since July and August, respectively.

Solely 10 packages have been recognized as a part of the marketing campaign that began in July, however they amassed greater than 9,900 downloads collectively by the point cybersecurity agency Socket discovered them.

The packages depend on NPM’s postinstall hook for the automated execution of a script when npm set up is run. The script identifies the sufferer’s working system and launches a payload in a brand new terminal window, to run independently of the NPM set up course of.

The malicious code has a number of layers of obfuscation and, upon set up, shows a pretend CAPTCHA immediate utilizing Node’s readline interface. It then sends system data to a distant server and downloads and executes the ultimate binary.

The payload is a 24 MB PyInstaller-packaged Python software that performs system reconnaissance and harvests delicate data from numerous purposes and companies, together with SQLite databases, JSON configuration recordsdata, textual content configuration recordsdata, and browsers.

The knowledge stealer targets keyrings (which retailer credentials), browser cookies, authentication tokens, SSH personal keys, and different delicate data, which is compressed in ZIP recordsdata and despatched to the attacker-controlled distant server.

A complete of 126 packages have been recognized as a part of the second marketing campaign, which began in August. Whereas two dozen packages have been eliminated, roughly 80 stay energetic, Koi Safety warns. The packages have over 86,000 downloads collectively.Commercial. Scroll to proceed studying.

Dubbed PhantomRaven, this marketing campaign depends on hidden dependencies to ship data stealer malware, whereas retaining the packages clear.

Abusing the distant dynamic dependencies (RDD) NPM function that permits builders to make use of HTTP URLs as dependency specifiers and utilizing a preinstall hook, the menace actor ensured that the malicious code was being fetched upon the packages’ set up from a distant server with out triggering detection.

The preinstall script runs routinely, with out warning the person or requiring their interplay, no matter how deep within the dependency tree the package deal is.

As soon as executed, the malware searches for e mail addresses inside the sufferer’s growth atmosphere, fingerprints their infrastructure looking for credentials and tokens offering entry to repositories and workflows, after which proceeds to full system reconnaissance.

The malware was seen exfiltrating the info through HTTP GET requests, encoded within the URL, through HTTP POST requests, as a JSON, and through a WebSocket connection to the attacker’s server.

In each campaigns, the menace actors relied on typosquatting to deceive builders into executing their malicious packages. As a part of PhantomRaven, the package deal names have been rigorously chosen to match LLM hallucinations, Koi says.

Builders asking AI assistants for package deal suggestions could also be given the believable names of non-existing packages. The menace actor behind the marketing campaign created these packages and builders trusting the AI suggestions downloaded them.

“Vetting dependencies is critical however not enough. Groups want visibility and controls that stretch past ‘what’ is pulled from NPM or PyPI to cowl ‘what occurs subsequent’ packaging, set up scripts, construct artifacts and runtime conduct. Postinstall hooks, repackaging steps, and terminal-spawned payloads are all legit mechanisms that attackers now weaponize, in order that they deserve consideration,” DryRun Safety CTO Ken Johnson stated.

“Operationally which means treating installs and builds as untrusted execution: run package deal installs in ephemeral, remoted CI containers; require reproducible builds and signed artifacts; scan for postinstall hooks and typosquatted names earlier than they attain CI; monitor outbound connections from construct hosts; and lock down entry to OS credential shops (or use vaults that don’t expose plaintext secrets and techniques). Add integrity checks and SBOMs into the pipeline so you possibly can detect sudden modifications to archives and binaries early,” Johnson added.

Associated: Provide Chain Assault Targets VS Code Extensions With ‘GlassWorm’ Malware

Associated: NPM Infrastructure Abused in Phishing Marketing campaign Geared toward Industrial and Electronics Corporations

Associated: GitHub Boosting Safety in Response to NPM Provide Chain Assaults

Associated: PyPI Warns Customers of Contemporary Phishing Marketing campaign

Security Week News Tags:Delivering, Downloaded, Infostealers, NPM, Packages, Times

Post navigation

Previous Post: PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code
Next Post: Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm

Related Posts

Up to 25% of Internet-Exposed ICS Are Honeypots: Researchers Security Week News
Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks Security Week News
Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking Security Week News
Choosing a Clear Direction in the Face of Growing Cybersecurity Demands Security Week News
New Interlock RAT Variant Distributed via FileFix Attacks Security Week News
Scattered Spider Suspect Arrested in US Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
  • Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
  • CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server
  • Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
  • Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
  • CISA Releases Best Security Practices Guide for Hardening Microsoft Exchange Server
  • Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News