Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens

Posted on July 22, 2025July 22, 2025 By CWS

A complicated provide chain assault has compromised a number of widely-used npm packages, together with eslint-config-prettier and eslint-plugin-prettier, after menace actors efficiently stole maintainer authentication tokens by way of a focused phishing marketing campaign.

The assault leveraged a typosquatted area, npnjs.com, designed to imitate the professional npmjs.org website and harvest developer credentials by way of convincing phishing emails.

The malicious marketing campaign represents a multi-stage provide chain compromise that exploited the belief inherent within the npm ecosystem.

Attackers first harvested maintainer credentials by way of refined phishing emails, then used these stolen tokens to publish malicious bundle variations on to npm repositories with out making any corresponding adjustments to GitHub repositories, making the assault considerably tougher to detect by way of conventional monitoring strategies.

Lists of bundle maintainers (Supply – Socket.dev)

Socket.dev researchers recognized the compromise after suspicious exercise reviews revealed that a number of variations of standard packages had been printed with out corresponding commits or pull requests on GitHub.

The affected packages included eslint-config-prettier variations 8.10.1, 9.1.1, 10.1.6, and 10.1.7, together with eslint-plugin-prettier variations 4.2.2 and 4.2.3, synckit 0.11.9, @pkgr/core 0.2.8, and napi-postinstall 0.3.1.

The malicious code particularly focused Home windows methods with a harmful payload designed to execute distant instructions.

Evaluation revealed that the injected code tried to load and execute a DLL file named node-gyp.dll utilizing the Home windows rundll32 utility, probably offering attackers with full system entry and the flexibility to execute arbitrary code on compromised machines.

An infection Mechanism

The assault’s sophistication lies in its exploitation of npm’s metadata accessibility, the place registration emails and maintainer data are simply scraped by menace actors to construct complete goal lists.

The malicious payload employed Home windows-specific execution strategies, using the next code sample:-

// Simplified illustration of malicious code injection
course of.platform === ‘win32’ && require(‘child_process’).exec(‘rundll32 node-gyp.dll,entrypoint’);

This method enabled the malware to attain persistence and distant code execution capabilities whereas remaining dormant on non-Home windows methods, demonstrating the attackers’ understanding of cross-platform growth environments and their capacity to craft focused payloads that maximize affect whereas minimizing detection throughout numerous growth ecosystems.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Actors, Hijack, Maintainers, NPM, Packages, Popular, Project, Steal, Threat, Tokens

Post navigation

Previous Post: Developers Beware of npm Phishing Email That Steal Your Login Credentials
Next Post: DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools

Related Posts

How to Conduct a Secure Code Review Cyber Security News
Behavioral Analysis for Detecting APT Intrusions in Real Time Cyber Security News
Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions Cyber Security News
Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence Cyber Security News
Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users Cyber Security News
Spotify Launches Direct Message Feature for Music Sharing, What are the Risks Associated? Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kali Linux vs Parrot OS
  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
  • SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kali Linux vs Parrot OS
  • How to Use Disposable Email Addresses
  • New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing
  • 143,000 Malware Files Attacked Android and iOS Device Users in Q2 2025
  • SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News