Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years

Posted on November 14, 2025November 14, 2025 By CWS

Safety researcher Paul McCarty uncovered a major coordinated spam marketing campaign focusing on the npm ecosystem.

The IndonesianFoods worm, because it has been named, consists of greater than 43,000 spam packages printed throughout not less than eleven consumer accounts over nearly two years.

These packages have survived undetected, representing multiple p.c of the complete npm registry whereas ready for activation.

The marketing campaign’s scope is alarming. A single execution of the malicious script can publish roughly twelve packages per minute, producing round 720 per hour or 17,000 per day.

The assault leverages a intelligent naming scheme that makes use of Indonesian names like “andi” and “budi” mixed with meals phrases akin to “rendang” and “sate,” adopted by random numbers and suffixes like “-kyuki” or “-breki.”

Examples embody packages named “zul-tapai9-kyuki” and “andi-rendang23-breki.” This distinctive sample creates camouflage throughout the repository whereas remaining traceable.

Every package deal seems official on first inspection, containing customary Subsequent[.]js mission constructions with correct configuration information, official dependencies like React and Tailwind CSS, {and professional} documentation.

The malicious element lies in hidden script information named both “auto[.]js” or “publishScript[.]js,” which sit dormant and unreferenced within the package deal construction.

ENDOR Labs safety analysts recognized that these packages have been a part of an assault first described in April 2024, the place attackers abuse the TEA protocol meant for rewarding open supply contributions.

The platform tracks cryptocurrency rewards for ecosystem individuals, which the attackers exploited to monetize their spam marketing campaign.

A minimum of one maintainer seemed to be an Indonesian software program engineer, explaining the regional specificity of this operation.

The Worm’s Self-Replicating Mechanism: How Dormant Code Prompts and Spreads

The IndonesianFoods worm demonstrates a very insidious spreading mechanism by means of dependency chains.

When the malicious script executes manually—triggered by instructions like “node auto[.]js”—it performs three steady actions. First, it removes the “personal”: true flag from package deal[.]json information, a safety builders use to forestall unintended publication of proprietary code.

Second, it generates random model numbers like “2.3.1” to bypass npm’s duplicate detection techniques.

Third, it updates the package deal[.]json and package-lock[.]json information, then runs “npm publish –entry public” to flood the registry with new packages on a seven to ten-second cycle.

What makes this assault significantly harmful is that every spam package deal references eight to 10 further spam packages as dependencies.

When builders set up one contaminated package deal, npm robotically fetches its total dependency tree, doubtlessly pulling in over 100 associated spam packages in cascade.

Putting in a single package deal might expose techniques to exponential proliferation of malicious packages throughout the registry.

A few of these packages gathered 1000’s of weekly downloads, creating alternatives for attackers to inject precise malicious code in future updates affecting huge numbers of installations.

The monetization side by means of TEA token rewards demonstrates attackers are incomes cryptocurrency by means of synthetic ecosystem worth, with some packages overtly displaying their earned token quantities of their documentation, reinforcing the monetary motivation behind this coordinated, two-year operation.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Flooded, Hackers, NPM, Packages, Registry, Spam, Survived, Years

Post navigation

Previous Post: Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign 
Next Post: Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands

Related Posts

Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code Cyber Security News
NVIDIA VApp for Windows Vulnerability Let Attackers Execute Malicious Code Cyber Security News
5 Immediate Steps to be Followed After Clicking on a Malicious Link Cyber Security News
DragonForce Ransomware Group – The Rise of a Relentless Cyber Threat in 2025 Cyber Security News
Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers Cyber Security News
GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
  • Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects
  • Akira Ransomware Group Made $244 Million in Ransom Proceeds

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
  • Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects
  • Akira Ransomware Group Made $244 Million in Ransom Proceeds

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News