Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm

Posted on November 13, 2025November 13, 2025 By CWS

A menace actor has revealed tens of hundreds of malicious NPM packages that include a self-replicating worm, safety researchers warn.

In contrast to latest provide chain assaults on NPM, the code used on this marketing campaign doesn’t steal credentials or information, however abuses the ecosystem for spam.

SourceCodeRed, which calls the malware ‘the IndonesianFoods worm’, has recognized over 43,900 malicious NPM packages related to 11 accounts, all named utilizing a scheme involving Indonesian names and meals.

The malicious code was designed to generate random names, modify the package deal.json recordsdata to make the packages public and add random model numbers, and publish the packages to the NPM registry.

In line with SourceCodeRed, the code repeats the identical steps in an infinite loop, publishing a brand new package deal each 7 seconds, always spamming the NPM registry.

“This floods the NPM registry with junk packages, wastes infrastructure assets, pollutes search outcomes, and creates provide chain dangers if builders by chance set up these malicious packages. The malware disguises itself as a official Subsequent.js utility to keep away from detection,” SourceCodeRed notes.

The exercise was additionally noticed by JFrog, which recognized over 80,000 self-replicating packages named utilizing an identical random title technology scheme. Along with the customized wordlist that features names and meals, the dictionary additionally makes use of adjectives, colours, and animal names.

In line with JFrog, which named the marketing campaign Large Purple, the malware reuses a sufferer consumer’s saved NPM credentials to publish newly generated packages to the registry at a quick tempo.Commercial. Scroll to proceed studying.

“The result’s a good, totally automated loop that may flood the npm ecosystem with giant numbers of superficially official packages, all derived from the identical code template and differentiated solely by randomized metadata,” JFrog notes.

The 80,000 malicious packages have been revealed throughout 18 consumer accounts and include solely the self-replicating publishing logic.

The precise goal of the marketing campaign stays unclear, however JFrog hypothesizes that it could possibly be “a dry run for a future marketing campaign the place the identical infrastructure and naming scheme could possibly be reused to ship actual malicious payloads for the campaigns with self-replicated code”.

Associated: Vital Flaw in In style React Native NPM Package deal Exposes Builders to Assaults

Associated: 136 NPM Packages Delivering Infostealers Downloaded 100,000 Occasions

Associated: NPM Infrastructure Abused in Phishing Marketing campaign Aimed toward Industrial and Electronics Companies

Associated: GitHub Boosting Safety in Response to NPM Provide Chain Assaults

Security Week News Tags:Distribute, Malicious, NPM, Packages, SelfReplicating, Tens, Thousands, Worm

Post navigation

Previous Post: Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data
Next Post: NHS Investigating Oracle EBS Hack Following Cl0p Ransomware Group Claim

Related Posts

Rethinking Success in Security: Why Climbing the Corporate Ladder Isn’t Always the Goal Security Week News
Chinese Hackers Exploiting React2Shell Vulnerability Security Week News
ConnectWise Discloses Suspected State-Sponsored Hack Security Week News
Managing the Trust-Risk Equation in AI: Predicting Hallucinations Before They Strike Security Week News
With Retail Cyberattacks on the Rise, Customers Find Orders Blocked and Shelves Empty Security Week News
GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
  • New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
  • Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
  • New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
  • Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark