Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign 

Posted on November 14, 2025November 14, 2025 By CWS

Greater than 150,000 malicious packages have been revealed within the NPM registry as a part of a not too long ago uncovered spam marketing campaign, Amazon reviews.

The packages comprise a self-replicating worm designed to generate and publish new packages in an infinite loop, continuously spamming the registry.

Earlier reviews on the exercise recognized roughly 80,000 packages revealed throughout 18 accounts, detailing the automated naming scheme utilized by the menace actor behind the marketing campaign.

Now, Amazon says it recognized twice as many packages between October 24 and November 12, all of that are linked to tea.xyz, a blockchain-based system that rewards open supply builders with a local cryptocurrency token.

All packages lack legit performance however comprise a self-replicating routine to create extra packages, modify their bundle.json information to make them public, and publish them to NPM.

They comprise a configuration file ‘tea.yaml’, probably meant to spice up visibility and web page rank in order that the menace actor might extract rewards from the tea.xyz protocol. The file hyperlinks the packages to blockchain pockets addresses.

“In contrast to conventional malware, these packages don’t comprise overtly malicious code. As an alternative, they exploit the tea.xyz reward mechanism by artificially inflating bundle metrics by automated replication and dependency chains, permitting menace actors to extract monetary advantages from the open supply group,” Amazon notes.

As JFrog and SourceCodeRed beforehand reported, the marketing campaign, tracked as IndonesianFoods and Massive Crimson, pollutes the NPM registry with low-quality, non-functional packages, wastes infrastructure sources, and introduces a danger for builders who obtain the code.Commercial. Scroll to proceed studying.

The marketing campaign poses further dangers if different menace actors determine to repeat it and begin partaking in automated bundle era for monetary acquire, focusing on further reward-based techniques.

“This incident demonstrates each the evolving nature of threats the place monetary incentives drive registry air pollution at unprecedented scale, and the important significance of industry-community collaboration in defending the software program provide chain,” Amazon notes.

Associated: Tens of Hundreds of Malicious NPM Packages Distribute Self-Replicating Worm

Associated: GlassWorm Malware Returns to Open VSX, Emerges on GitHub

Associated: 136 NPM Packages Delivering Infostealers Downloaded 100,000 Occasions

Associated: Over 6,700 Non-public Repositories Made Public in Nx Provide Chain Assault

Security Week News Tags:Amazon, Campaign, Detects, NPM, Packages, WormPowered

Post navigation

Previous Post: Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
Next Post: Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years

Related Posts

Grok-4 Falls to a Jailbreak Two days After Its Release Security Week News
Zscaler Acquires AI Security Company SPLX Security Week News
ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories Security Week News
Keycard Emerges From Stealth Mode With $38 Million in Funding Security Week News
Scattered Spider Activity Drops Following Arrests, but Others Adopting Group’s Tactics Security Week News
Arch Linux Project Responding to Week-Long DDoS Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
  • New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
  • Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
  • New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
  • Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark