Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
React Native Packages Targeted by Credential-Stealing Malware

React Native Packages Targeted by Credential-Stealing Malware

Posted on March 17, 2026 By CWS

A significant security breach struck the developer community on March 16, 2026, when a malicious actor, identified as Glassworm, compromised two popular React Native npm packages. These packages were transformed into tools for stealing credentials and cryptocurrencies, causing widespread concern.

Details of the Compromised Packages

The affected npm packages, namely [email protected] and [email protected], were simultaneously published by the user AstrOOnauta. In the month leading to the attack, these packages were downloaded over 134,887 times, highlighting their extensive use in the developer ecosystem. Trusted for handling essential mobile UI components, they became inadvertent carriers of malware.

The malware activation required no special actions from users. A simple npm install command was sufficient to initiate the infection process. The attack leveraged a new preinstall hook within the packages, executing a heavily obfuscated JavaScript file, install.js, which made the malware installation seamless and undetectable during routine updates.

Execution and Impact of the Attack

The malware’s execution chain was meticulously crafted to remain concealed. Upon execution, install.js scanned systems for Russian language settings, halting if detected, a common tactic among Russian-speaking cybercriminals. If no such markers were found, the malware proceeded to query the Solana blockchain to retrieve a concealed URL for subsequent payload delivery.

This method, using a public blockchain as a relay, significantly hindered traditional blocking methods via domain or network filtering. The second stage script decrypted a third-stage payload, focusing on Windows systems. It established persistence using Windows Task Scheduler and registry keys while further components were fetched from attacker-controlled servers, targeting cryptocurrency wallets and developer credentials.

Response and Recommendations

In response to this breach, developers are urged to audit their systems for the affected package versions and treat compromised systems with utmost priority. Immediate actions include rotating npm tokens, GitHub credentials, and any exposed cryptocurrency wallet keys. Additionally, network logs should be scrutinized for suspicious connections to specific IP addresses linked to the attack.

To mitigate future risks, developers should review package lifecycle scripts and be vigilant about unexpected preinstall hooks in their build environments. These proactive measures can substantially reduce exposure to similar supply chain threats.

This incident underscores the importance of maintaining robust security practices in software development. Staying informed and prepared can help mitigate the impacts of such sophisticated cyber threats.

Cyber Security News Tags:Blockchain, credential theft, cyber attack, Cybersecurity, developer tools, GlassWorm, JavaScript, Malware, mobile development, NPM, package management, React Native, security breach, Software Security, supply chain attack

Post navigation

Previous Post: Tracebit Secures $20M to Enhance Cybersecurity Solutions
Next Post: AI Vulnerability Exposed Through Custom Font Attacks

Related Posts

Ransomware Tactics Evolve Amid Declining Profits, Google Reports Ransomware Tactics Evolve Amid Declining Profits, Google Reports Cyber Security News
Exposed ‘Kim’ Dump Exposes Kimsuky Hackers New Tactics, Techniques, and Infrastructure Exposed ‘Kim’ Dump Exposes Kimsuky Hackers New Tactics, Techniques, and Infrastructure Cyber Security News
Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities Cyber Security News
SecurityMetrics Wins “Data Leak Detection Solution of the Year” at the 2025 CyberSecurity Breakthrough Awards SecurityMetrics Wins “Data Leak Detection Solution of the Year” at the 2025 CyberSecurity Breakthrough Awards Cyber Security News
SnappyClient Malware Threatens Windows with Stealthy Data Breaches SnappyClient Malware Threatens Windows with Stealthy Data Breaches Cyber Security News
Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark