Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign 

Posted on November 14, 2025November 14, 2025 By CWS

Greater than 150,000 malicious packages have been revealed within the NPM registry as a part of a not too long ago uncovered spam marketing campaign, Amazon reviews.

The packages comprise a self-replicating worm designed to generate and publish new packages in an infinite loop, continuously spamming the registry.

Earlier reviews on the exercise recognized roughly 80,000 packages revealed throughout 18 accounts, detailing the automated naming scheme utilized by the menace actor behind the marketing campaign.

Now, Amazon says it recognized twice as many packages between October 24 and November 12, all of that are linked to tea.xyz, a blockchain-based system that rewards open supply builders with a local cryptocurrency token.

All packages lack legit performance however comprise a self-replicating routine to create extra packages, modify their bundle.json information to make them public, and publish them to NPM.

They comprise a configuration file ‘tea.yaml’, probably meant to spice up visibility and web page rank in order that the menace actor might extract rewards from the tea.xyz protocol. The file hyperlinks the packages to blockchain pockets addresses.

“In contrast to conventional malware, these packages don’t comprise overtly malicious code. As an alternative, they exploit the tea.xyz reward mechanism by artificially inflating bundle metrics by automated replication and dependency chains, permitting menace actors to extract monetary advantages from the open supply group,” Amazon notes.

As JFrog and SourceCodeRed beforehand reported, the marketing campaign, tracked as IndonesianFoods and Massive Crimson, pollutes the NPM registry with low-quality, non-functional packages, wastes infrastructure sources, and introduces a danger for builders who obtain the code.Commercial. Scroll to proceed studying.

The marketing campaign poses further dangers if different menace actors determine to repeat it and begin partaking in automated bundle era for monetary acquire, focusing on further reward-based techniques.

“This incident demonstrates each the evolving nature of threats the place monetary incentives drive registry air pollution at unprecedented scale, and the important significance of industry-community collaboration in defending the software program provide chain,” Amazon notes.

Associated: Tens of Hundreds of Malicious NPM Packages Distribute Self-Replicating Worm

Associated: GlassWorm Malware Returns to Open VSX, Emerges on GitHub

Associated: 136 NPM Packages Delivering Infostealers Downloaded 100,000 Occasions

Associated: Over 6,700 Non-public Repositories Made Public in Nx Provide Chain Assault

Security Week News Tags:Amazon, Campaign, Detects, NPM, Packages, WormPowered

Post navigation

Previous Post: Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
Next Post: Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years

Related Posts

Arch Linux Project Responding to Week-Long DDoS Attack Security Week News
Fencing and Pet Company Jewett-Cameron Hit by Ransomware Security Week News
Security Firm Andy Frain Says 100,000 People Impacted by Ransomware Attack Security Week News
Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage Security Week News
Fortinet, Ivanti Patch High-Severity Vulnerabilities Security Week News
Vibe Coding: When Everyone’s a Developer, Who Secures the Code? Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
  • Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects
  • Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
  • Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
  • Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects
  • Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
  • Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News