Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack

Posted on July 20, 2025July 20, 2025 By CWS

Jul 20, 2025Ravie LakshmananDevOps / Risk Intelligence
Cybersecurity researchers have alerted to a provide chain assault that has focused fashionable npm packages through a phishing marketing campaign designed to steal the venture maintainers’ npm tokens.
The captured tokens had been then used to publish malicious variations of the packages on to the registry with none supply code commits or pull requests on their respective GitHub repositories.
The listing of affected packages and their rogue variations, in accordance with Socket, is listed under –

eslint-config-prettier (variations 8.10.1, 9.1.1, 10.1.6, and 10.1.7)
eslint-plugin-prettier (variations 4.2.2 and 4.2.3)
synckit (model 0.11.9)
@pkgr/core (model 0.2.8)
napi-postinstall (model 0.3.1)

“The injected code tried to execute a DLL on Home windows machines, doubtlessly permitting distant code execution,” the software program provide chain safety agency mentioned.
The event comes within the aftermath of a phishing marketing campaign that has been discovered to ship e mail messages impersonating npm with a purpose to trick venture maintainers into clicking on a typosquatted hyperlink (“npnjs[.]com,” versus “npmjs[.]com”) that harvested their credentials.
The digital missives, with the topic line “Please confirm your e mail deal with,” spoofed a reputable e mail deal with related to npm (“assist@npmjs[.]org”), urging recipients to validate their e mail deal with by clicking on the embedded hyperlink.
The bogus touchdown web page to which the victims are redirected to, per Socket, is a clone of the reputable npm login web page that is designed to seize their login data.
Builders who use the affected packages are suggested to cross-check the variations put in and rollback to a protected model. Venture maintainers are beneficial to activate two-factor authentication to safe their accounts, and use scoped tokens as a substitute of passwords for publishing packages.
“This incident exhibits how shortly phishing assaults on maintainers can escalate into ecosystem-wide threats,” Socket mentioned.

The findings coincide with an unrelated marketing campaign that has flooded npm with 28 packages containing protestware performance that may disable mouse-based interplay on web sites with a Russian or Belarusian area. They’re additionally engineered to play the Ukrainian nationwide anthem on a loop.
Nevertheless, the assault solely works when the location customer has their browser language settings set to Russian and, in some instances, the identical web site is visited a second time, thereby guaranteeing that solely repeat guests are focused. The exercise marks an growth of a marketing campaign that was first flagged final month.
“This protestware underscores that actions taken by builders can propagate unnoticed in nested dependencies and should take days or even weeks to manifest,” safety researcher Olivia Brown mentioned.
Arch Linux Removes 3 AUR Packages that Put in Chaos RAT Malware

It additionally comes because the Arch Linux crew mentioned it has pulled three malicious AUR packages that had been uploaded to the Arch Consumer Repository (AUR) and harbored hidden performance to put in a distant entry trojan known as Chaos RAT from a now-removed GitHub repository.
The affected packages are: “librewolf-fix-bin,” “firefox-patch-bin,” and “zen-browser-patched-bin.” They had been revealed by a consumer named “danikpapas” on July 16, 2025.
“These packages had been putting in a script coming from the identical GitHub repository that was recognized as a Distant Entry Trojan (RAT),” the maintainers mentioned. “We strongly encourage customers which will have put in one in every of these packages to take away them from their system and to take the mandatory measures with a purpose to guarantee they weren’t compromised.”

The Hacker News Tags:Attack, Injected, Maintainer, Malware, NPM, Packages, Phishing, Stolen, Tokens

Post navigation

Previous Post: Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers
Next Post: Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations

Related Posts

Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering The Hacker News
China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil The Hacker News
Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks The Hacker News
UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns The Hacker News
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms The Hacker News
Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available
  • Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
  • Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack
  • Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers
  • Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SharePoint Under Attack: Microsoft Warns of Zero-Day Exploited in the Wild – No Patch Available
  • Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
  • Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack
  • Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers
  • Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News