Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Npm Packages Exploit Crypto Keys and CI Secrets

Npm Packages Exploit Crypto Keys and CI Secrets

Posted on February 23, 2026 By CWS

Introduction to the Threat

Cybersecurity experts have raised alarms about a new threat involving a group of harmful npm packages designed to steal credentials and cryptocurrency keys. Named SANDWORM_MODE by security firm Socket, this attack leverages at least 19 malicious npm packages to infiltrate developer environments. The campaign mimics previous Shai-Hulud attacks, embedding code to extract system data, tokens, secrets, and API keys while using stolen npm and GitHub identities for further spread.

Details of the Malicious Campaign

The malicious packages were released by two npm aliases, official334 and javaorg. These packages include:

  • [email protected]
  • [email protected]
  • [email protected]

Additionally, four dormant packages that currently lack harmful capabilities were identified. The attack also employs a GitHub Action to extract CI/CD secrets via HTTPS with a DNS fallback, including a destructive feature that wipes home directories if access to GitHub and npm is lost.

Advanced Malware Features

A key component of the malware, known as “McpInject,” targets AI coding assistants by deploying a malicious server. This server pretends to be a genuine tool, embedding prompts to access sensitive files like ~/.ssh/id_rsa. Furthermore, the malware targets various coding tools and harvests API keys from several language model providers. The payload includes a polymorphic engine designed to evade detection by altering variables and control flow.

Stages of the Attack Chain

The attack unfolds in two stages. The initial phase captures credentials and crypto keys, while the second, activated after 48 hours, intensifies data harvesting and propagation. Developers are advised to uninstall the identified packages, rotate tokens, and scrutinize configuration files for unauthorized changes. Security firm Socket suggests the threat actors are enhancing their methods, as indicated by certain toggles that disable destructive routines.

Related Security Concerns

The disclosure coincides with reports from Veracode and JFrog about other malicious npm packages. These packages, like “buildrunner-dev” and “eslint-verify-plugin,” are designed to deploy remote access trojans across various operating systems. The .NET malware from “buildrunner-dev” and the complex infection chain from “eslint-verify-plugin” underline the sophisticated nature of these threats, prompting developers to be vigilant against npm package vulnerabilities.

The Hacker News Tags:AI coding, API tokens, CI secrets, crypto keys, Cybersecurity, GitHub, Malware, NPM, supply chain

Post navigation

Previous Post: North Korean Cybercriminals Intensify Crypto Attacks
Next Post: Romanian Hacker Admits to Selling Access to US State Network

Related Posts

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass The Hacker News
3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches The Hacker News
Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks The Hacker News
Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks The Hacker News
Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack The Hacker News
Learn to Spot Risks and Patch Safely with Community-Maintained Tools Learn to Spot Risks and Patch Safely with Community-Maintained Tools The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit Git Platforms for Malware and Phishing
  • AI API Routers: Security Risks and Data Theft Concerns
  • Espionage Campaign Uses Fake Messaging Apps to Spread Spyware
  • France Adopts Linux for Government Workstations
  • Hackers Exploit AiTM to Misdirect Employee Salaries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit Git Platforms for Malware and Phishing
  • AI API Routers: Security Risks and Data Theft Concerns
  • Espionage Campaign Uses Fake Messaging Apps to Spread Spyware
  • France Adopts Linux for Government Workstations
  • Hackers Exploit AiTM to Misdirect Employee Salaries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark