Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

Posted on September 16, 2025September 16, 2025 By CWS

Sep 16, 2025Ravie LakshmananMalware / Cyber Assault

Cybersecurity researchers have flagged a contemporary software program provide chain assault concentrating on the npm registry that has affected greater than 40 packages that belong to a number of maintainers.
“The compromised variations embody a operate (NpmModule.updatePackage) that downloads a package deal tarball, modifies package deal.json, injects a neighborhood script (bundle.js), repacks the archive, and republishes it, enabling automated trojanization of downstream packages,” provide chain safety firm Socket mentioned.
The tip purpose of the marketing campaign is to look developer machines for secrets and techniques utilizing TruffleHog’s credential scanner and transmit them to an exterior server below the attacker’s management. The assault is able to concentrating on each Home windows and Linux methods.

The next packages have been recognized as impacted by the incident –

[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected], @4.1.2
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
[email protected]
[email protected], 0.2.1
[email protected], 5.11.1
@nativescript-community/[email protected]
@nativescript-community/sentry 4.6.43
@nativescript-community/textual [email protected]
@nativescript-community/[email protected]
@nativescript-community/[email protected]
@nativescript-community/[email protected]
@nativescript-community/[email protected]
@nativescript-community/[email protected]
@nativescript-community/[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]

The malicious JavaScript code (“bundle.js”) injected into every of the trojanized package deal is designed to obtain and run TruffleHog, a respectable secret scanning instrument, utilizing it to scan the host for tokens and cloud credentials, similar to GITHUB_TOKEN, NPM_TOKEN, AWS_ACCESS_KEY_ID, and AWS_SECRET_ACCESS_KEY.

“It validates npm tokens with the whoami endpoint, and it interacts with GitHub APIs when a token is offered,” Socket mentioned. “It additionally makes an attempt cloud metadata discovery that may leak short-lived credentials inside cloud construct brokers.”
The script then abuses the developer’s credentials (i.e., the GitHub private entry tokens) to create a GitHub Actions workflow in .github/workflows, and exfiltrates the collected knowledge to a webhook[.]web site endpoint.
Builders are suggested to audit their environments and rotate npm tokens and different uncovered secrets and techniques if the aforementioned packages are current with publishing credentials.
“The workflow that it writes to repositories persists past the preliminary host,” the corporate famous. “As soon as dedicated, any future CI run can set off the exfiltration step from inside the pipeline the place delicate secrets and techniques and artifacts can be found by design.”
crates.io Phishing Marketing campaign
The disclosure comes because the Rust Safety Response Working Group is warning of phishing emails from a typosquatted area, rustfoundation[.]dev, concentrating on crates.io customers.

The messages, which originate from safety@rustfoundation[.]dev, warn recipients of an alleged compromise of the crates.io infrastructure and instruct them to click on on an embedded hyperlink to rotate their login info in order to “be sure that the attacker can’t modify any packages printed by you.”
The rogue hyperlink, github.rustfoundation[.]dev, mimics a GitHub login web page, indicating a transparent try on the a part of the attackers to seize victims’ credentials. The phishing web page is presently inaccessible.
“These emails are malicious and are available from a website identify not managed by the Rust Basis (nor the Rust Mission), seemingly with the aim of stealing your GitHub credentials,” the Rust Safety Response WG mentioned. “We have now no proof of a compromise of the crates.io infrastructure.”
The Rust crew additionally mentioned they’re taking steps to observe any suspicious exercise on crates.io, along with getting the phishing area taken down.

The Hacker News Tags:Attack, bundle.js, Chain, Compromised, Credentials, NPM, Packages, Steal, Supply

Post navigation

Previous Post: Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads
Next Post: Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

Related Posts

Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access The Hacker News
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them The Hacker News
Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto The Hacker News
Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets The Hacker News
iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More The Hacker News
Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fraud Prevention Company SEON Raises $80 Million in Series C Funding
  • Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues
  • Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities
  • Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence
  • New Maranhão Stealer Via Pirated Software Leveraging Cloud-Hosted Platforms to Steal Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fraud Prevention Company SEON Raises $80 Million in Series C Funding
  • Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues
  • Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities
  • Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence
  • New Maranhão Stealer Via Pirated Software Leveraging Cloud-Hosted Platforms to Steal Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News