Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
React Native Packages Targeted by Credential-Stealing Malware

React Native Packages Targeted by Credential-Stealing Malware

Posted on March 17, 2026 By CWS

A significant security breach struck the developer community on March 16, 2026, when a malicious actor, identified as Glassworm, compromised two popular React Native npm packages. These packages were transformed into tools for stealing credentials and cryptocurrencies, causing widespread concern.

Details of the Compromised Packages

The affected npm packages, namely [email protected] and [email protected], were simultaneously published by the user AstrOOnauta. In the month leading to the attack, these packages were downloaded over 134,887 times, highlighting their extensive use in the developer ecosystem. Trusted for handling essential mobile UI components, they became inadvertent carriers of malware.

The malware activation required no special actions from users. A simple npm install command was sufficient to initiate the infection process. The attack leveraged a new preinstall hook within the packages, executing a heavily obfuscated JavaScript file, install.js, which made the malware installation seamless and undetectable during routine updates.

Execution and Impact of the Attack

The malware’s execution chain was meticulously crafted to remain concealed. Upon execution, install.js scanned systems for Russian language settings, halting if detected, a common tactic among Russian-speaking cybercriminals. If no such markers were found, the malware proceeded to query the Solana blockchain to retrieve a concealed URL for subsequent payload delivery.

This method, using a public blockchain as a relay, significantly hindered traditional blocking methods via domain or network filtering. The second stage script decrypted a third-stage payload, focusing on Windows systems. It established persistence using Windows Task Scheduler and registry keys while further components were fetched from attacker-controlled servers, targeting cryptocurrency wallets and developer credentials.

Response and Recommendations

In response to this breach, developers are urged to audit their systems for the affected package versions and treat compromised systems with utmost priority. Immediate actions include rotating npm tokens, GitHub credentials, and any exposed cryptocurrency wallet keys. Additionally, network logs should be scrutinized for suspicious connections to specific IP addresses linked to the attack.

To mitigate future risks, developers should review package lifecycle scripts and be vigilant about unexpected preinstall hooks in their build environments. These proactive measures can substantially reduce exposure to similar supply chain threats.

This incident underscores the importance of maintaining robust security practices in software development. Staying informed and prepared can help mitigate the impacts of such sophisticated cyber threats.

Cyber Security News Tags:Blockchain, credential theft, cyber attack, Cybersecurity, developer tools, GlassWorm, JavaScript, Malware, mobile development, NPM, package management, React Native, security breach, Software Security, supply chain attack

Post navigation

Previous Post: Tracebit Secures $20M to Enhance Cybersecurity Solutions
Next Post: AI Vulnerability Exposed Through Custom Font Attacks

Related Posts

Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server Cyber Security News
Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim Cyber Security News
Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability Cyber Security News
Lazarus Hackers Deploying Three RATs on Compromised Systems Possibly Using 0-Day Vulnerability Lazarus Hackers Deploying Three RATs on Compromised Systems Possibly Using 0-Day Vulnerability Cyber Security News
New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild Cyber Security News
20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly 20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Vulnerability Exposed Through Custom Font Attacks
  • React Native Packages Targeted by Credential-Stealing Malware
  • Tracebit Secures $20M to Enhance Cybersecurity Solutions
  • Ransomware Tactics Evolve Amid Declining Profits, Google Reports
  • Tech Giants Unite to Tackle Online Scams and Fraud

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Vulnerability Exposed Through Custom Font Attacks
  • React Native Packages Targeted by Credential-Stealing Malware
  • Tracebit Secures $20M to Enhance Cybersecurity Solutions
  • Ransomware Tactics Evolve Amid Declining Profits, Google Reports
  • Tech Giants Unite to Tackle Online Scams and Fraud

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News