Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Npm Package to Target AI Developers

Hackers Exploit Npm Package to Target AI Developers

Posted on April 8, 2026 By CWS

A recent cyber attack has emerged, posing a significant risk to software developers utilizing AI coding tools. On March 20, 2026, a malicious npm package named gemini-ai-checker was introduced by an account called gemini-check. This package was deceptively presented as a utility for verifying Google Gemini AI tokens.

Deceptive Package Unveiled

Although the package appeared authentic, it harbored malware designed to exfiltrate credentials, files, and tokens from AI development environments. The README file mimicked the content of an unrelated JavaScript library, chai-await-async, raising potential red flags that many developers overlooked.

Upon installation, the package discreetly communicated with a Vercel-hosted server at server-check-genimi.vercel.app, executing a JavaScript payload on the victim’s system. Cyber and Ramen analysts linked the payload to OtterCookie, a backdoor associated with the Contagious Interview campaign, believed to involve North Korean actors.

Widespread Impact and Persistence

This threat actor was also behind two other packages, express-flowlimit and chai-extensions-extras, all utilizing the same Vercel infrastructure. By the time of reporting, these packages had collectively been downloaded over 500 times. Although gemini-ai-checker was removed before April 2026, the other packages remained active.

Distinctively targeting AI developer tools, the malware sought to access directories used by platforms such as Cursor, Claude, and others, compromising API keys, conversation logs, and source codes.

Technical Intricacies of the Attack

The infection method was meticulously crafted to evade detection. The gemini-ai-checker package contained multiple files and dependencies, unusually large for a token checker, yet structured to appear legitimate. Within the package, a file named libconfig.js concealed the C2 configuration details as fragmented variables, avoiding detection by basic scanning tools.

When installed, libcaller.js reconstituted these components and initiated HTTP GET requests to the Vercel endpoint. This method, avoiding traditional disk writes, bypassed many security measures.

The decoded payload comprised a four-module architecture, each functioning as a separate Node.js process, connecting to a C2 server. The modules targeted browser data, cryptocurrency wallets, and AI tool directories, among other critical areas.

Defensive Measures and Recommendations

It is advised that defenders block or monitor outbound connections to Vercel and utilize Microsoft’s KQL queries to detect suspicious Node.js activities. Developers should scrutinize npm package contents before installation and be wary of discrepancies between package names and README files.

Safeguarding directories used by AI tools is essential, treating them with the same care as critical system folders. Reporting any suspicious packages attempting to impersonate well-known brands can aid the community in mitigating potential threats.

Stay updated on cybersecurity developments by following us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for the latest insights.

Cyber Security News Tags:AI coding environments, AI security, AI tools, code security, Cybersecurity, Gemini AI, malicious code, Malware, North Korean hackers, npm attack, npm packages, software developers, software supply chain, software vulnerabilities, Vercel infrastructure

Post navigation

Previous Post: Kubernetes Misconfigurations Enable Dangerous Cloud Exploits

Related Posts

Snake Keyloggers Abuse Java Utilities to Evade Security Tools Snake Keyloggers Abuse Java Utilities to Evade Security Tools Cyber Security News
Malicious NPM Package with 56K Downloads Steals WhatsApp Messages Malicious NPM Package with 56K Downloads Steals WhatsApp Messages Cyber Security News
APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities Cyber Security News
Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it Cyber Security News
Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities Cyber Security News
Top Log Monitoring Tools to Watch in 2026 Top Log Monitoring Tools to Watch in 2026 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit Npm Package to Target AI Developers
  • Kubernetes Misconfigurations Enable Dangerous Cloud Exploits
  • BPFDoor Variants Evade Detection Using Stateless C2
  • BlueHammer Exploit Affects Windows Defender Security
  • Why Automated Pentesting Needs a Broader Approach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit Npm Package to Target AI Developers
  • Kubernetes Misconfigurations Enable Dangerous Cloud Exploits
  • BPFDoor Variants Evade Detection Using Stateless C2
  • BlueHammer Exploit Affects Windows Defender Security
  • Why Automated Pentesting Needs a Broader Approach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark