Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads

Posted on September 16, 2025September 16, 2025 By CWS

A complicated and widespread provide chain assault has struck the NPM ecosystem, compromising the favored @ctrl/tinycolor bundle, which is downloaded over 2 million instances per week.

The assault additionally affected greater than 40 different packages from numerous maintainers, introducing a harmful self-propagating malware designed to steal developer credentials and unfold itself throughout the software program panorama.

The incident got here to mild after customers found suspicious exercise on GitHub and promptly alerted the open-source group.

The malicious variations, recognized as 4.1.1 and 4.1.2 of @ctrl/tinycolor, have been shortly faraway from the NPM registry, however not earlier than they have been distributed.

Safety analysts from StepSecurity later supplied an in depth technical breakdown of the assault, confirming its severity and distinctive propagation methodology.

Self-Spreading Malware Infects NPM Packages

What units this assault aside is its automated, worm-like conduct. The malware incorporates a “self-propagation engine” that actively seeks out and infects different software program packages.

As soon as a developer’s machine is compromised, the malware makes use of a perform named NpmModule.updatePackage to inject its malicious code into different tasks maintained by the identical creator.

This creates a cascading impact, permitting the risk to unfold quickly via the interconnected internet of software program dependencies with out additional guide intervention from the attackers.

The first aim of the malware is aggressive credential harvesting. The attackers repurposed a professional secret-scanning software, TruffleHog, to hunt for delicate info on compromised techniques. It particularly targets a variety of worthwhile developer secrets and techniques, together with:

NPM authentication tokens

GitHub private entry tokens

Amazon Net Companies (AWS) entry keys

Google Cloud Platform (GCP) service credentials

Microsoft Azure credentials

To make sure its persistence, the malware creates a malicious GitHub Actions workflow file named .github/workflows/shai-hulud-workflow.yml.

This file permits the attackers to keep up entry to compromised repositories, probably re-infecting them or exfiltrating extra knowledge over time. All stolen knowledge was funneled to a publicly uncovered endpoint on the webhook.website service.

Mitigations

In response to this vital risk, safety specialists are urging builders and organizations to take instant motion.

Step one is to examine all tasks for the presence of the compromised packages and their malicious variations. If discovered, they need to be eliminated or downgraded to a secure model instantly.

Given the malware’s intensive credential-stealing capabilities, rotating all probably uncovered secrets and techniques is essential. This contains NPM tokens, GitHub entry tokens, and all cloud supplier credentials (AWS, Azure, GCP) that will have been current on improvement or CI/CD techniques.

Lastly, a radical audit of infrastructure is beneficial. Builders ought to scan their repositories for the malicious shai-hulud-workflow.yml file, assessment latest NPM publishing exercise for any unauthorized bundle releases, and monitor outbound community visitors for any connections to the recognized exfiltration endpoint.

Based mostly on the data supplied, here’s a record of the compromised packages and their affected variations.

Affected PackageMalicious Model(s)@ctrl/tinycolor4.1.1, 4.1.2@ctrl/deluge7.2.2angulartics214.1.2@ctrl/golang-template1.4.3@ctrl/magnet-link4.0.4@ctrl/ngx-codemirror7.0.2@ctrl/ngx-csv6.0.2@ctrl/ngx-emoji-mart9.2.2@ctrl/ngx-rightclick4.0.2@ctrl/qbittorrent9.7.2@ctrl/react-adsense2.0.2@ctrl/shared-torrent6.3.2@ctrl/torrent-file4.1.2@ctrl/transmission7.3.1@ctrl/ts-base324.0.2encounter-playground0.0.5json-rules-engine-simplified0.2.4@nativescript-community/gesturehandler2.0.35@nativescript-community/sentry4.6.43@nativescript-community/text1.6.13@nativescript-community/ui-collectionview6.0.6@nativescript-community/ui-drawer0.1.30@nativescript-community/ui-image4.5.6@nativescript-community/ui-material-bottomsheet7.2.72@nativescript-community/ui-material-core7.2.76@nativescript-community/ui-material-core-tabs7.2.76ngx-color10.0.2ngx-toastr1.9.0.2ngx-trend8.0.1react-complaint-image0.0.35react-jsonschema-form-conditionals0.3.21react-jsonschema-form-extras1.0.4rxnt-authentication0.0.6rxnt-healthchecks-nestjs1.0.5rxnt-kue1.0.7swc-plugin-component-annotate1.9.2ts-gaussian3.0.6

Free dwell webinar on new malware techniques from our analysts! Study superior detection strategies -> Register for Free

Cyber Security News Tags:Attack, Chain, ctrltinycolor, Downloads, Hijacks, Massive, Million, Supply

Post navigation

Previous Post: Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs
Next Post: 40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

Related Posts

Threat Actors Impersonate FBI IC3 Website to Steal The Visitors’ Personal Information Cyber Security News
Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework Cyber Security News
Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks Cyber Security News
TAG-144 Actors Attacking Government Entities With New Tactics, Techniques, and Procedures Cyber Security News
Top 10 Best Brand Protection Solutions For Enterprises in 2025 Cyber Security News
Columbia University Data Breach – Hackers Stolen 870,000 Individuals Personal and Financial Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Unveils new AI-Protection for Android to Keep You Safe From Mobile Scams
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • Ukrainian Man Extradited From Ireland to US Over Conti Ransomware Charges
  • Progress Patches MOVEit Transfer Uncontrolled Resource Consumption vulnerability
  • Open VSX Downplays Impact From GlassWorm Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Unveils new AI-Protection for Android to Keep You Safe From Mobile Scams
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • Ukrainian Man Extradited From Ireland to US Over Conti Ransomware Charges
  • Progress Patches MOVEit Transfer Uncontrolled Resource Consumption vulnerability
  • Open VSX Downplays Impact From GlassWorm Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News