Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm

Posted on November 13, 2025November 13, 2025 By CWS

A menace actor has revealed tens of hundreds of malicious NPM packages that include a self-replicating worm, safety researchers warn.

In contrast to latest provide chain assaults on NPM, the code used on this marketing campaign doesn’t steal credentials or information, however abuses the ecosystem for spam.

SourceCodeRed, which calls the malware ‘the IndonesianFoods worm’, has recognized over 43,900 malicious NPM packages related to 11 accounts, all named utilizing a scheme involving Indonesian names and meals.

The malicious code was designed to generate random names, modify the package deal.json recordsdata to make the packages public and add random model numbers, and publish the packages to the NPM registry.

In line with SourceCodeRed, the code repeats the identical steps in an infinite loop, publishing a brand new package deal each 7 seconds, always spamming the NPM registry.

“This floods the NPM registry with junk packages, wastes infrastructure assets, pollutes search outcomes, and creates provide chain dangers if builders by chance set up these malicious packages. The malware disguises itself as a official Subsequent.js utility to keep away from detection,” SourceCodeRed notes.

The exercise was additionally noticed by JFrog, which recognized over 80,000 self-replicating packages named utilizing an identical random title technology scheme. Along with the customized wordlist that features names and meals, the dictionary additionally makes use of adjectives, colours, and animal names.

In line with JFrog, which named the marketing campaign Large Purple, the malware reuses a sufferer consumer’s saved NPM credentials to publish newly generated packages to the registry at a quick tempo.Commercial. Scroll to proceed studying.

“The result’s a good, totally automated loop that may flood the npm ecosystem with giant numbers of superficially official packages, all derived from the identical code template and differentiated solely by randomized metadata,” JFrog notes.

The 80,000 malicious packages have been revealed throughout 18 consumer accounts and include solely the self-replicating publishing logic.

The precise goal of the marketing campaign stays unclear, however JFrog hypothesizes that it could possibly be “a dry run for a future marketing campaign the place the identical infrastructure and naming scheme could possibly be reused to ship actual malicious payloads for the campaigns with self-replicated code”.

Associated: Vital Flaw in In style React Native NPM Package deal Exposes Builders to Assaults

Associated: 136 NPM Packages Delivering Infostealers Downloaded 100,000 Occasions

Associated: NPM Infrastructure Abused in Phishing Marketing campaign Aimed toward Industrial and Electronics Companies

Associated: GitHub Boosting Safety in Response to NPM Provide Chain Assaults

Security Week News Tags:Distribute, Malicious, NPM, Packages, SelfReplicating, Tens, Thousands, Worm

Post navigation

Previous Post: Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data
Next Post: NHS Investigating Oracle EBS Hack Following Cl0p Ransomware Group Claim

Related Posts

Cyberattack Disrupts Check-In Systems at Major European Airports Security Week News
ThreatSpike Raises $14 Million in Series A Funding Security Week News
US, Allies Push for SBOMs to Bolster Cybersecurity Security Week News
Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play Security Week News
CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors Security Week News
Nova Scotia Power Confirms Ransomware Attack, 280k Notified of Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Imunify360 Vulnerability Could Expose Millions of Sites to Hacking
  • Critical Imunify360 AV Vulnerability Exposes 56 Million Linux-hosted Websites to RCE Attacks
  • Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
  • Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign
  • Google Says Chinese ‘Lighthouse’ Phishing Kit Disrupted Following Lawsuit  

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Imunify360 Vulnerability Could Expose Millions of Sites to Hacking
  • Critical Imunify360 AV Vulnerability Exposes 56 Million Linux-hosted Websites to RCE Attacks
  • Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
  • Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign
  • Google Says Chinese ‘Lighthouse’ Phishing Kit Disrupted Following Lawsuit  

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News