Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Over 46,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack

Posted on November 13, 2025November 13, 2025 By CWS

Cybersecurity researchers are calling consideration to a large-scale spam marketing campaign that has flooded the npm registry with hundreds of pretend packages since early 2024 as a part of a possible financially motivated effort.
“The packages have been systematically revealed over an prolonged interval, flooding the npm registry with junk packages that survived within the ecosystem for nearly two years,” Endor Labs researchers Cris Staicu and Kiran Raj mentioned in a Tuesday report.
The coordinated marketing campaign has up to now revealed as many as 46,484 packages, in keeping with SourceCodeRED safety researcher Paul McCarty, who first flagged the exercise. The top purpose is sort of uncommon – It is designed to inundate the npm registry with random packages slightly than specializing in knowledge theft or different malicious behaviors.
The worm-life propagation mechanism and the usage of a particular naming scheme that depends on Indonesian names and meals phrases for the newly created packages have lent it the moniker IndonesianFoods. The bogus packages masquerade as Subsequent.js tasks.
“What makes this risk significantly regarding is that the attackers took the time to craft an NPM worm, slightly than a singular assault,” McCarty mentioned. “Even worse, these risk actors have been staging this for over two years.”
Some indicators that time to a sustained, coordinated effort embrace the constant naming patterns and the truth that the packages are revealed from a small community of over a dozen npm accounts.
The worm is positioned inside a single JavaScript file (e.g., “auto.js” or “publishScript.js”) in every package deal, staying dormant till a person manually runs the script utilizing a command like “node auto.js.” In different phrases, it doesn’t execute robotically throughout set up or as a part of a “postinstall” hook.
It is not clear why somebody would go to the extent of working JavaScript manually, however the existence of over 43,000 packages suggests both a number of victims executed the script – both by chance or out of curiosity – or the attackers ran it themselves to flood the registry, Henrik Plate, head of safety analysis at Endor Labs, advised The Hacker Information.

“We have not discovered proof of a coordinated social engineering marketing campaign, however the code was written with social engineering potential, attainable sufferer eventualities embrace: pretend weblog posts, tutorials, or README entries instructing customers to run ‘node auto.js’ to ‘full setup’ or ‘repair a construct problem,’ [and] CI/CD pipeline construct scripts with wildcards one thing like node *.js that execute all JavaScript information,” Raj added.
“The payload’s dormant design is meant to evade automated detection, by requiring handbook execution as an alternative of ‘autorun,’ the attackers cut back the prospect of being flagged by safety scanners and sandboxing methods.”

The handbook execution causes the script to provoke a sequence of actions in an infinite loop, together with eradicating “personal”: true> from the “package deal.json” file. This setting is often used to forestall unintended publication of personal repositories. It then proceeds to create a random package deal identify utilizing the interior dictionary and assign it a random model quantity to bypass npm’s duplicate model detection.
Within the closing stage, the spam package deal is uploaded to npm utilizing the “npm publish” command. This step is repeated in an infinite loop, inflicting a brand new package deal to be pushed out each 7 to 10 seconds. This interprets to about 12 packages per minute, 720 per hour, or 17,000 per day.
“This floods the NPM registry with junk packages, wastes infrastructure assets, pollutes search outcomes, and creates provide chain dangers if builders unintentionally set up these malicious packages,” McCarty mentioned.
In accordance with Endor Labs, the marketing campaign is a part of an assault that was first flagged by Phylum (now a part of Veracode) and Sonatype in April 2024 that concerned the publication of hundreds of spam packages to conduct a “huge automated crypto farming marketing campaign” by abusing the Tea protocol.
“What makes this marketing campaign significantly insidious is its worm-like spreading mechanism,” the researchers mentioned. “Evaluation of the ‘package deal.json’ information reveals that these spam packages don’t exist in isolation; they reference one another as dependencies, making a self-replicating community.”
Thus, when a person installs one of many spam packages, it causes npm to fetch all the dependency tree, straining registry bandwidth as extra dependencies are fetched exponentially.
Endor Labs mentioned a few of the attacker-controlled packages, corresponding to arts-dao and gula-dao, embrace a tea.yaml file itemizing 5 completely different TEA accounts. The Tea protocol is a decentralized framework that permits open-source builders to be rewarded for his or her software program contributions.
This probably signifies that the risk actors are utilizing this marketing campaign as a monetization vector by incomes TEA tokens by artificially inflating their impression rating. It is not clear who’s behind the exercise, however supply code and infrastructure clues counsel it could possibly be somebody working out of Indonesia.
The applying safety firm has additionally flagged a second variant that employs a special naming scheme comprising random English phrases (e.g., able_crocodile-notthedevs).
The findings additionally serve to spotlight a safety blind spot in safety scanners, that are identified to flag packages that execute malicious code throughout set up by monitoring lifecycle hooks or detecting suspicious system calls.
“On this case, they discovered nothing as a result of there was nothing to search out on the time of set up,” Endor Labs mentioned. “The sheer variety of packages flagged within the present marketing campaign exhibits that safety scanners should analyze these indicators sooner or later.”

Garrett Calpouzos, principal safety researcher at software program provide chain safety agency Sonatype, characterised IndonesianFoods as a self-publishing worm working at a large scale, overwhelming safety knowledge methods within the course of.
“The technical sophistication is not essentially increased — apparently, these packages don’t seem to even attempt to infiltrate developer machines — it is the automation and scale which might be escalating at an alarming charge,” Calpouzos mentioned.
“Every wave of those assaults weaponizes npm’s open nature in barely new methods. This one could not steal credentials or inject code, nevertheless it nonetheless strains the ecosystem and proves how trivial it’s to disrupt the world’s largest software program provide chain. Whereas the motivation is unclear, the implications are placing.”
When reached for remark, a GitHub spokesperson mentioned it has eliminated the packages in query from npm, and that it is dedicated to detecting, analyzing, and taking down packages and accounts that go towards its insurance policies.
“We have now disabled malicious npm packages in accordance with GitHub’s Acceptable Use Insurance policies which prohibit posting content material that immediately helps illegal lively assault or malware campaigns which might be inflicting technical harms,” the spokesperson added.
“We make use of handbook opinions and at-scale detections that use machine studying and continually evolve to mitigate malicious utilization of the platform. We additionally encourage prospects and group members to report abuse and spam.”

The Hacker News Tags:Attack, Fake, Flood, NPM, Packages, Registry, Spam, WormLike

Post navigation

Previous Post: Chinese National Jailed for Laundering Over £5 Billion by Defrauding Over 128,000 Victims
Next Post: Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases

Related Posts

How Small Teams Can Secure Their Google Workspace The Hacker News
TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations The Hacker News
Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection The Hacker News
Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries The Hacker News
Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims The Hacker News
Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FortiWeb Authentication Bypass Vulnerability Exploited
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program
  • New Wave of Steganography Attacks: Hackers Hiding XWorm in PNGs 
  • Google Sues ‘Lighthouse’ Phishing-as-a-service Kit Behind Massive Phishing Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FortiWeb Authentication Bypass Vulnerability Exploited
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program
  • New Wave of Steganography Attacks: Hackers Hiding XWorm in PNGs 
  • Google Sues ‘Lighthouse’ Phishing-as-a-service Kit Behind Massive Phishing Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News