Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malicious NPM Packages Target Cursor AI’s macOS Users

Posted on May 9, 2025May 9, 2025 By CWS

Three malicious NPM packages posing as developer instruments for the favored Cursor AI code editor have been caught deploying a backdoor on macOS techniques, vulnerability detection agency Socket stories.

Cursor is a proprietary built-in improvement setting (IDE) that integrates AI options instantly inside the coding setting. It provides tiered entry to LLMs, with premium language fashions priced per request.

The packages, named sw‑cur, sw‑cur1, and aiide-cur, declare to offer low cost entry to Cursor, exploiting the builders’ curiosity in avoiding paying the charges.

All three packages have been printed by a risk actor utilizing the NPM usernames gtr2018 and aiide, and have amassed over 3,200 downloads to this point.

“As of this writing, these packages stay stay on the NPM registry. We’ve formally petitioned for his or her removing,” Socket warns.

Upon execution, a malicious script contained by these packages harvests consumer credentials, fetches a payload from a distant server and decrypts and decompresses it.

It additionally replaces Cursor code with malicious code equipped by the attacker, and restarts the appliance to acquire persistent distant execution capabilities inside the IDE.

Moreover, the vulnerability detection agency seen that sw‑cur would disable Cursor’s auto-update mechanism, prone to forestall removing.Commercial. Scroll to proceed studying.

“The assault particularly targets macOS installations of this software by modifying inside information reminiscent of principal.js underneath the /Functions/Cursor.app/… path. The malware makes use of the editor’s trusted runtime to execute risk actor-controlled code and preserve persistence,” Socket notes.

All three packages use the identical credential exfiltration, payload retrieval, decryption, and file-patching routines, albeit they use totally different hardcoded domains.

The assault, Socket warns, could lead on not solely to credential and code theft, or extra malware infections, but in addition to unauthorized entry to paid companies and any codebase opened inside the IDE.

“In enterprise environments or open supply tasks, the dangers multiply. A trojanized IDE on a developer’s machine can leak proprietary supply code, introduce malicious dependencies into builds, or function a foothold for lateral motion inside CI/CD pipelines,” Socket notes.

Cursor customers who downloaded any of those packages are suggested to revive Cursor from a trusted supply, rotate credentials, and audit their code for potential unauthorized modifications.

Associated: Lots of Obtain Malicious NPM Bundle Able to Delivering Rootkit

Associated: Dozens of Malicious NPM Packages Steal Consumer, System Information

Associated: Builders Warned of Malicious PyPI, NPM, Ruby Packages Focusing on Macs

Associated: Malicious NPM, PyPI Packages Stealing Consumer Info

Security Week News Tags:AIs, Cursor, macOS, Malicious, NPM, Packages, Target, Users

Post navigation

Previous Post: Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits
Next Post: 160,000 Impacted by Valsoft Data Breach

Related Posts

DanaBot Botnet Disrupted, 16 Suspects Charged Security Week News
Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior Security Week News
React Native Aria Packages Backdoored in Supply Chain Attack Security Week News
200,000 Harbin Clinic Patients Impacted by NRS Data Breach Security Week News
The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw Security Week News
Anubis Ransomware Packs a Wiper to Permanently Delete Files Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News