Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

High-Value NPM Developers Compromised in New Phishing Campaign

Posted on July 24, 2025July 24, 2025 By CWS

A brand new provide chain assault resulted within the supply of malware by way of widespread NPM packages after the maintainers’ accounts have been compromised.

First reported on final week, the assaults begin with a phishing electronic mail that depends on typosquatting to impersonate the Node.js package deal registry.

The attackers created a full copy of the NPM web site at ‘npnjs.com’, and used it to ship legitimate-looking emails to a number of builders, prompting them to offer their login credentials.

The emails contained tokenized URLs, which permit the attackers to trace clicks, pre-fill sufferer knowledge on the phishing web site, or generate pretend classes to imitate NPM’s login course of. The messages additionally contained help hyperlinks to the respectable npmjs.com web site.

Shortly after safety agency Socket flagged such a phishing electronic mail despatched to the maintainer of packages with 34 million mixed weekly downloads, a number of widespread NPM packages have been reported as compromised as a part of the phishing marketing campaign.

Malicious variations of those packages – together with eslint-config-prettier, eslint-plugin-prettier, napi-postinstall, @pkgr/core, and synckit – that have been printed to the registry, with out corresponding commits on GitHub, tried to execute a malicious DLL on Home windows techniques.

“The maintainer confirmed their NPM token was compromised by way of the npnjs.com phishing electronic mail. The attackers used the stolen credentials to publish malicious variations of a number of packages with out touching the GitHub repos, making the assault tougher to identify,” Socket notes.

Prettier and ESLint integrations are used throughout 1000’s of tasks, and the influence of this compromise could possibly be devastating, because the deployed malware is reportedly troublesome to take away.Commercial. Scroll to proceed studying.

Shortly after, software program engineer Jordan Harband warned that the ‘is’ package deal, which has nicely over 2 million weekly downloads, was additionally compromised. Totally cross-platform, the package deal can run on Home windows, Linux, and macOS, suggesting that the attackers have been seemingly seeking to broaden their attain.

“The previous proprietor was one way or the other faraway from the NPM package deal, and emailed me to be re-added. Every little thing appeared regular, so I obliged (irritated [that] the NPM would take away an proprietor with out notifying the opposite homeowners) and the subsequent morning this was printed,” he defined.

The got-fetch package deal, which has over 20,000 weekly downloads, was additionally compromised as a part of the marketing campaign, Socket says.

In line with DeceptIQ founder and CEO Rad Kawar, the attackers seemingly extracted developer electronic mail addresses from package deal metadata, arrange the required infrastructure, and constructed a loader and credential stealer for use within the provide chain assault.

Kawar explains that the attackers seemingly abused the NPM authentication mechanism to generate login hyperlinks and steal entry tokens that don’t expire, stating that the developer isn’t notified that the requested token was requested on a special machine.

The malicious code injected into eslint-config-prettier was a loader that led to the deployment of Scavenger malware when the package deal is executed, Canadian cybersecurity startup Invoke RE explains.

The loader was compiled on the identical day that the malicious package deal was printed to the registry and contained varied anti-analysis and anti-detection strategies.

The loader was seen requesting a payload from its command-and-control (C&C) server, which turned out to be an data stealer focusing on Chromium-based browsers.

Dubbed Scavenger, the malware extracts data associated to browser extensions, cached knowledge from ServiceWorkerCache and DawnWebGPUCache, and browser historical past. Reportedly, it may well additionally disable safety alerts in Chrome.

Associated: Malicious NPM Packages Disguised as Categorical Utilities Permit Attackers to Wipe Methods

Associated: Ongoing Marketing campaign Makes use of 60 NPM Packages to Steal Information

Associated: Fashionable Scraping Software’s NPM Package deal Compromised in Provide Chain Assault

Associated: Malicious NPM Packages Goal Cursor AI’s macOS Customers

Security Week News Tags:Campaign, Compromised, Developers, HighValue, NPM, Phishing

Post navigation

Previous Post: Pentests once a year? Nope. It’s time to build an offensive SOC
Next Post: Chinese Hackers Attacking Windows Systems in Targeted Campaign to Deploy Ghost RAT and PhantomNet Malwares

Related Posts

Rethinking Success in Security: Why Climbing the Corporate Ladder Isn’t Always the Goal Security Week News
Qantas Confirms 5.7 Million Impacted by Data Breach Security Week News
Counter Antivirus Service AVCheck Shut Down by Law Enforcement Security Week News
CISA Warns of Two Exploited TeleMessage Vulnerabilities  Security Week News
Thousands Hit by The North Face Credential Stuffing Attack Security Week News
Hackers Access Legacy Systems in Oxford City Council Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VOIP-Based Botnet Attacking Routers Configured With Default Password
  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VOIP-Based Botnet Attacking Routers Configured With Default Password
  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons
  • Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide
  • 10 Best API Monitoring Tools in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News