Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials

Posted on September 16, 2025September 16, 2025 By CWS

Sep 16, 2025Ravie LakshmananMalware / Cyber Assault

Cybersecurity researchers have flagged a contemporary software program provide chain assault concentrating on the npm registry that has affected greater than 40 packages that belong to a number of maintainers.
“The compromised variations embody a operate (NpmModule.updatePackage) that downloads a package deal tarball, modifies package deal.json, injects a neighborhood script (bundle.js), repacks the archive, and republishes it, enabling automated trojanization of downstream packages,” provide chain safety firm Socket mentioned.
The tip purpose of the marketing campaign is to look developer machines for secrets and techniques utilizing TruffleHog’s credential scanner and transmit them to an exterior server below the attacker’s management. The assault is able to concentrating on each Home windows and Linux methods.

The next packages have been recognized as impacted by the incident –

[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected], @4.1.2
@ctrl/[email protected]
@ctrl/[email protected]
@ctrl/[email protected]
[email protected]
[email protected], 0.2.1
[email protected], 5.11.1
@nativescript-community/[email protected]
@nativescript-community/sentry 4.6.43
@nativescript-community/textual [email protected]
@nativescript-community/[email protected]
@nativescript-community/[email protected]
@nativescript-community/[email protected]
@nativescript-community/[email protected]
@nativescript-community/[email protected]
@nativescript-community/[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]

The malicious JavaScript code (“bundle.js”) injected into every of the trojanized package deal is designed to obtain and run TruffleHog, a respectable secret scanning instrument, utilizing it to scan the host for tokens and cloud credentials, similar to GITHUB_TOKEN, NPM_TOKEN, AWS_ACCESS_KEY_ID, and AWS_SECRET_ACCESS_KEY.

“It validates npm tokens with the whoami endpoint, and it interacts with GitHub APIs when a token is offered,” Socket mentioned. “It additionally makes an attempt cloud metadata discovery that may leak short-lived credentials inside cloud construct brokers.”
The script then abuses the developer’s credentials (i.e., the GitHub private entry tokens) to create a GitHub Actions workflow in .github/workflows, and exfiltrates the collected knowledge to a webhook[.]web site endpoint.
Builders are suggested to audit their environments and rotate npm tokens and different uncovered secrets and techniques if the aforementioned packages are current with publishing credentials.
“The workflow that it writes to repositories persists past the preliminary host,” the corporate famous. “As soon as dedicated, any future CI run can set off the exfiltration step from inside the pipeline the place delicate secrets and techniques and artifacts can be found by design.”
crates.io Phishing Marketing campaign
The disclosure comes because the Rust Safety Response Working Group is warning of phishing emails from a typosquatted area, rustfoundation[.]dev, concentrating on crates.io customers.

The messages, which originate from safety@rustfoundation[.]dev, warn recipients of an alleged compromise of the crates.io infrastructure and instruct them to click on on an embedded hyperlink to rotate their login info in order to “be sure that the attacker can’t modify any packages printed by you.”
The rogue hyperlink, github.rustfoundation[.]dev, mimics a GitHub login web page, indicating a transparent try on the a part of the attackers to seize victims’ credentials. The phishing web page is presently inaccessible.
“These emails are malicious and are available from a website identify not managed by the Rust Basis (nor the Rust Mission), seemingly with the aim of stealing your GitHub credentials,” the Rust Safety Response WG mentioned. “We have now no proof of a compromise of the crates.io infrastructure.”
The Rust crew additionally mentioned they’re taking steps to observe any suspicious exercise on crates.io, along with getting the phishing area taken down.

The Hacker News Tags:Attack, bundle.js, Chain, Compromised, Credentials, NPM, Packages, Steal, Supply

Post navigation

Previous Post: Massive Supply Chain Attack Hijacks ctrl/tinycolor With 2 Million Downloads
Next Post: Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds

Related Posts

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency The Hacker News
Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor The Hacker News
Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control The Hacker News
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) The Hacker News
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times The Hacker News
Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News