Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Hijack Popular npm Packages to Steal The Project Maintainers’ npm Tokens

Posted on July 22, 2025July 22, 2025 By CWS

A complicated provide chain assault has compromised a number of widely-used npm packages, together with eslint-config-prettier and eslint-plugin-prettier, after menace actors efficiently stole maintainer authentication tokens by way of a focused phishing marketing campaign.

The assault leveraged a typosquatted area, npnjs.com, designed to imitate the professional npmjs.org website and harvest developer credentials by way of convincing phishing emails.

The malicious marketing campaign represents a multi-stage provide chain compromise that exploited the belief inherent within the npm ecosystem.

Attackers first harvested maintainer credentials by way of refined phishing emails, then used these stolen tokens to publish malicious bundle variations on to npm repositories with out making any corresponding adjustments to GitHub repositories, making the assault considerably tougher to detect by way of conventional monitoring strategies.

Lists of bundle maintainers (Supply – Socket.dev)

Socket.dev researchers recognized the compromise after suspicious exercise reviews revealed that a number of variations of standard packages had been printed with out corresponding commits or pull requests on GitHub.

The affected packages included eslint-config-prettier variations 8.10.1, 9.1.1, 10.1.6, and 10.1.7, together with eslint-plugin-prettier variations 4.2.2 and 4.2.3, synckit 0.11.9, @pkgr/core 0.2.8, and napi-postinstall 0.3.1.

The malicious code particularly focused Home windows methods with a harmful payload designed to execute distant instructions.

Evaluation revealed that the injected code tried to load and execute a DLL file named node-gyp.dll utilizing the Home windows rundll32 utility, probably offering attackers with full system entry and the flexibility to execute arbitrary code on compromised machines.

An infection Mechanism

The assault’s sophistication lies in its exploitation of npm’s metadata accessibility, the place registration emails and maintainer data are simply scraped by menace actors to construct complete goal lists.

The malicious payload employed Home windows-specific execution strategies, using the next code sample:-

// Simplified illustration of malicious code injection
course of.platform === ‘win32’ && require(‘child_process’).exec(‘rundll32 node-gyp.dll,entrypoint’);

This method enabled the malware to attain persistence and distant code execution capabilities whereas remaining dormant on non-Home windows methods, demonstrating the attackers’ understanding of cross-platform growth environments and their capacity to craft focused payloads that maximize affect whereas minimizing detection throughout numerous growth ecosystems.

Enhance detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now

Cyber Security News Tags:Actors, Hijack, Maintainers, NPM, Packages, Popular, Project, Steal, Threat, Tokens

Post navigation

Previous Post: Developers Beware of npm Phishing Email That Steal Your Login Credentials
Next Post: DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools

Related Posts

Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems Cyber Security News
Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files Cyber Security News
New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools Cyber Security News
Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Cyber Security News
Hackers Exploiting Critical Langflow Vulnerability to Deploy Flodrix Botnet and Take System Control Cyber Security News
Researchers Expose Scattered Spider’s Tools, Techniques and Key Indicators Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems
  • Dell Says Data Leaked by Hackers Is Fake
  • Vulnerabilities Expose Helmholz Industrial Routers to Hacking
  • Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access
  • Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems
  • Dell Says Data Leaked by Hackers Is Fake
  • Vulnerabilities Expose Helmholz Industrial Routers to Hacking
  • Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access
  • Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News