Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Supply Chain Attack Targets art-template npm Package

Supply Chain Attack Targets art-template npm Package

Posted on May 22, 2026 By CWS

A widely-utilized JavaScript library, known as art-template, has been compromised in a sophisticated supply chain attack that deployed an iOS browser exploit kit. This breach allowed malicious code to be inserted into users’ browsers, transforming typical web applications into vectors targeting Apple device users globally.

The Genesis of the Attack

The attack initiated when art-template’s npm package, initially maintained by a developer identified as ‘aui,’ was transferred to an unknown individual. Under this new management, the package was swiftly weaponized. Reports pointing out unusual behavior were deleted, and malicious versions continued to be distributed to obscure the attack from discovery.

Socket.dev’s researchers reported to Cyber Security News (CSN) that their investigation connected this operation to the Coruna exploit kit, previously documented as an iOS exploit framework. Their study, titled ‘Coruna Respawned,’ indicated that the backdoored package’s method of delivery paralleled patterns seen in the earlier framework, suggesting direct reuse or a closely related derivative.

Details of the Exploit

The compromised versions of the package rolled out an increasing series of injections across multiple updates. Version 4.13.3 concealed a loader using encoding to connect to an external domain. Subsequent versions, 4.13.5 and 4.13.6, eliminated obfuscation, embedding a plaintext script loader into the browser bundle file. As a result, any web application incorporating these versions silently executed the exploit kit in every user’s browser.

Given the package’s extensive use in JavaScript projects worldwide, the scope of exposure was significant. Developers unknowingly became conduits for a targeted mobile attack against their users, with no visible changes to alert them.

Technical Mechanisms and Mitigation

The core of the malicious activity revolves around a JavaScript implant that acts as a watering hole exploit delivery mechanic. Once deployed via the compromised npm package, it discreetly profiles each site visitor. Activation occurs only on Safari running on specific iOS versions, and it silently exits on other browsers and iOS versions above 17.2.

Upon identifying a matching device, the implant transmits the victim’s IP address, iOS version, and a tracking code to a command-and-control server every ten seconds. Anti-bot checks ensure the target is genuine before the final payload is deployed, tailored to the victim’s iOS version.

Developers are advised to audit dependency trees for art-template versions 4.13.3 to 4.13.6. Essential mitigation steps include locking dependencies, reviewing browser bundle outputs for unexpected loaders, and monitoring network requests from JavaScript applications.

The meticulous nature of the attack, marked by browser-level exploitation rather than traditional phishing, highlights the need for rigorous security scrutiny and immediate action for any application using the affected versions.

Cyber Security News Tags:Apple device security, art-template, browser security, Coruna exploit, Cybersecurity, dependency audit, iOS exploit, JavaScript, Malware, npm package, Safari exploit, security review, supply chain attack, Vulnerability, watering-hole attack

Post navigation

Previous Post: Russian Cyber Threats Intensify: RDP, VPN, and Social Tactics
Next Post: Hackers Exploit Middle Eastern Telecoms for Cyber Operations

Related Posts

Chaos Emerges as Faster, Smarter, and More Dangerous Ransomware Chaos Emerges as Faster, Smarter, and More Dangerous Ransomware Cyber Security News
FBI Halts Russian Cyberattack on Routers FBI Halts Russian Cyberattack on Routers Cyber Security News
Reclaim Security Secures M for Cybersecurity Innovation Reclaim Security Secures $26M for Cybersecurity Innovation Cyber Security News
UIDAI Initiates Bug Bounty to Enhance Aadhaar Security UIDAI Initiates Bug Bounty to Enhance Aadhaar Security Cyber Security News
NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads Cyber Security News
Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Model Uncovers 10,000 Critical Software Flaws
  • Critical Nginx Vulnerability Demands Immediate Patching
  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Model Uncovers 10,000 Critical Software Flaws
  • Critical Nginx Vulnerability Demands Immediate Patching
  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark