Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads

Posted on September 16, 2025September 16, 2025 By CWS

A complicated and widespread provide chain assault has struck the NPM ecosystem, compromising the favored @ctrl/tinycolor bundle, which is downloaded over 2 million instances per week.

The assault additionally affected greater than 40 different packages from numerous maintainers, introducing a harmful self-propagating malware designed to steal developer credentials and unfold itself throughout the software program panorama.

The incident got here to mild after customers found suspicious exercise on GitHub and promptly alerted the open-source group.

The malicious variations, recognized as 4.1.1 and 4.1.2 of @ctrl/tinycolor, have been shortly faraway from the NPM registry, however not earlier than they have been distributed.

Safety analysts from StepSecurity later supplied an in depth technical breakdown of the assault, confirming its severity and distinctive propagation methodology.

Self-Spreading Malware Infects NPM Packages

What units this assault aside is its automated, worm-like conduct. The malware incorporates a “self-propagation engine” that actively seeks out and infects different software program packages.

As soon as a developer’s machine is compromised, the malware makes use of a perform named NpmModule.updatePackage to inject its malicious code into different tasks maintained by the identical creator.

This creates a cascading impact, permitting the risk to unfold quickly via the interconnected internet of software program dependencies with out additional guide intervention from the attackers.

The first aim of the malware is aggressive credential harvesting. The attackers repurposed a professional secret-scanning software, TruffleHog, to hunt for delicate info on compromised techniques. It particularly targets a variety of worthwhile developer secrets and techniques, together with:

NPM authentication tokens

GitHub private entry tokens

Amazon Net Companies (AWS) entry keys

Google Cloud Platform (GCP) service credentials

Microsoft Azure credentials

To make sure its persistence, the malware creates a malicious GitHub Actions workflow file named .github/workflows/shai-hulud-workflow.yml.

This file permits the attackers to keep up entry to compromised repositories, probably re-infecting them or exfiltrating extra knowledge over time. All stolen knowledge was funneled to a publicly uncovered endpoint on the webhook.website service.

Mitigations

In response to this vital risk, safety specialists are urging builders and organizations to take instant motion.

Step one is to examine all tasks for the presence of the compromised packages and their malicious variations. If discovered, they need to be eliminated or downgraded to a secure model instantly.

Given the malware’s intensive credential-stealing capabilities, rotating all probably uncovered secrets and techniques is essential. This contains NPM tokens, GitHub entry tokens, and all cloud supplier credentials (AWS, Azure, GCP) that will have been current on improvement or CI/CD techniques.

Lastly, a radical audit of infrastructure is beneficial. Builders ought to scan their repositories for the malicious shai-hulud-workflow.yml file, assessment latest NPM publishing exercise for any unauthorized bundle releases, and monitor outbound community visitors for any connections to the recognized exfiltration endpoint.

Based mostly on the data supplied, here’s a record of the compromised packages and their affected variations.

Affected PackageMalicious Model(s)@ctrl/tinycolor4.1.1, 4.1.2@ctrl/deluge7.2.2angulartics214.1.2@ctrl/golang-template1.4.3@ctrl/magnet-link4.0.4@ctrl/ngx-codemirror7.0.2@ctrl/ngx-csv6.0.2@ctrl/ngx-emoji-mart9.2.2@ctrl/ngx-rightclick4.0.2@ctrl/qbittorrent9.7.2@ctrl/react-adsense2.0.2@ctrl/shared-torrent6.3.2@ctrl/torrent-file4.1.2@ctrl/transmission7.3.1@ctrl/ts-base324.0.2encounter-playground0.0.5json-rules-engine-simplified0.2.4@nativescript-community/gesturehandler2.0.35@nativescript-community/sentry4.6.43@nativescript-community/text1.6.13@nativescript-community/ui-collectionview6.0.6@nativescript-community/ui-drawer0.1.30@nativescript-community/ui-image4.5.6@nativescript-community/ui-material-bottomsheet7.2.72@nativescript-community/ui-material-core7.2.76@nativescript-community/ui-material-core-tabs7.2.76ngx-color10.0.2ngx-toastr1.9.0.2ngx-trend8.0.1react-complaint-image0.0.35react-jsonschema-form-conditionals0.3.21react-jsonschema-form-extras1.0.4rxnt-authentication0.0.6rxnt-healthchecks-nestjs1.0.5rxnt-kue1.0.7swc-plugin-component-annotate1.9.2ts-gaussian3.0.6

Free dwell webinar on new malware techniques from our analysts! Study superior detection strategies -> Register for Free

Cyber Security News Tags:Attack, Chain, ctrltinycolor, Downloads, Hijacks, Massive, Million, Supply

Post navigation

Previous Post: Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs
Next Post: 40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

Related Posts

AI-powered Pentesting Tool ‘Villager’ Combines Kali Linux Tools with DeepSeek AI for Automated Attacks Cyber Security News
Firefox 141 Released With Fix for Multiple Vulnerabilities Cyber Security News
Cisco Webex Meetings Vulnerability Let Attackers Manipulate HTTP Responses Cyber Security News
2,000+ Devices Hacked Using Weaponized Social Security Statement Themes Cyber Security News
New BRAODO Stealer Campaign Abuses GitHub To Host Payloads And Evade Detection  Cyber Security News
BlueNoroff Hackers Weaponize Zoom App to Attack System Using Infostealer Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence
  • Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds
  • 40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials
  • Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads
  • Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence
  • Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds
  • 40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials
  • Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads
  • Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News