Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malicious NPM Packages Target Cursor AI’s macOS Users

Posted on May 9, 2025May 9, 2025 By CWS

Three malicious NPM packages posing as developer instruments for the favored Cursor AI code editor have been caught deploying a backdoor on macOS techniques, vulnerability detection agency Socket stories.

Cursor is a proprietary built-in improvement setting (IDE) that integrates AI options instantly inside the coding setting. It provides tiered entry to LLMs, with premium language fashions priced per request.

The packages, named sw‑cur, sw‑cur1, and aiide-cur, declare to offer low cost entry to Cursor, exploiting the builders’ curiosity in avoiding paying the charges.

All three packages have been printed by a risk actor utilizing the NPM usernames gtr2018 and aiide, and have amassed over 3,200 downloads to this point.

“As of this writing, these packages stay stay on the NPM registry. We’ve formally petitioned for his or her removing,” Socket warns.

Upon execution, a malicious script contained by these packages harvests consumer credentials, fetches a payload from a distant server and decrypts and decompresses it.

It additionally replaces Cursor code with malicious code equipped by the attacker, and restarts the appliance to acquire persistent distant execution capabilities inside the IDE.

Moreover, the vulnerability detection agency seen that sw‑cur would disable Cursor’s auto-update mechanism, prone to forestall removing.Commercial. Scroll to proceed studying.

“The assault particularly targets macOS installations of this software by modifying inside information reminiscent of principal.js underneath the /Functions/Cursor.app/… path. The malware makes use of the editor’s trusted runtime to execute risk actor-controlled code and preserve persistence,” Socket notes.

All three packages use the identical credential exfiltration, payload retrieval, decryption, and file-patching routines, albeit they use totally different hardcoded domains.

The assault, Socket warns, could lead on not solely to credential and code theft, or extra malware infections, but in addition to unauthorized entry to paid companies and any codebase opened inside the IDE.

“In enterprise environments or open supply tasks, the dangers multiply. A trojanized IDE on a developer’s machine can leak proprietary supply code, introduce malicious dependencies into builds, or function a foothold for lateral motion inside CI/CD pipelines,” Socket notes.

Cursor customers who downloaded any of those packages are suggested to revive Cursor from a trusted supply, rotate credentials, and audit their code for potential unauthorized modifications.

Associated: Lots of Obtain Malicious NPM Bundle Able to Delivering Rootkit

Associated: Dozens of Malicious NPM Packages Steal Consumer, System Information

Associated: Builders Warned of Malicious PyPI, NPM, Ruby Packages Focusing on Macs

Associated: Malicious NPM, PyPI Packages Stealing Consumer Info

Security Week News Tags:AIs, Cursor, macOS, Malicious, NPM, Packages, Target, Users

Post navigation

Previous Post: Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits
Next Post: 160,000 Impacted by Valsoft Data Breach

Related Posts

CrowdStrike Plans Layoffs to Pursue $10B ARR Target Security Week News
UK Legal Aid Agency Finds Data Breach Following Cyberattack Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact  Security Week News
Apple Patches Major Security Flaws in iOS, macOS Platforms Security Week News
Microsoft to Lay Off About 3% of Its Workforce Security Week News
Google Agrees to $1.3 Billion Settlement in Texas Privacy Lawsuits Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Remove Malware From Your PC
  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News