Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Supply Chain Worm Exploits npm to Steal Developer Tokens

Supply Chain Worm Exploits npm to Steal Developer Tokens

Posted on April 22, 2026 By CWS

Cybersecurity experts have identified a new security threat where npm packages are being exploited to distribute a self-propagating worm. This malware, flagged by Socket and StepSecurity, spreads by hijacking developer tokens and is being tracked under the name CanisterSprawl. The worm has similarities to TeamPCP’s CanisterWorm, using an ICP canister to enhance resilience against takedowns.

Affected Packages and Propagation Techniques

The compromised packages include @automagik/genie, @fairwords/loopback-connector-es, @fairwords/websocket, @openwebconcept/design-tokens, @openwebconcept/theme-owc, and pgserve. Malicious actors have used a post-install hook to steal credentials and secrets from developer environments. These stolen npm tokens are then used to distribute altered package versions, expanding the malware’s reach.

The information targeted includes configuration files such as .npmrc, SSH keys, and cloud credentials from major providers. Additionally, the malware seeks credentials from Chromium-based browsers and cryptocurrency extensions, sending the data to both an HTTPS webhook and an ICP canister.

Broader Implications and Similar Attacks

This attack is part of a broader pattern affecting the open-source ecosystem. Notably, a legitimate Python package named xinference was also compromised to deliver a Base64-encoded payload for collecting credentials. TeamPCP, which has been associated with past security breaches, has denied involvement, suggesting a copycat operation may be at play.

In a related development, attacks on npm and PyPI have been observed where packages disguise themselves as Kubernetes utilities to execute unauthorized actions. These malicious packages can establish various proxies and servers on infected machines, highlighting the persistent threat to open-source platforms.

Future Outlook and Mitigation Strategies

As the threat landscape evolves, effective mitigation strategies are crucial. Recently, Google-owned Wiz exposed an AI-powered attack campaign exploiting GitHub Actions to extract developer credentials. While such attacks demonstrate vulnerabilities in the CI/CD pipeline, adherence to modern security practices, including contributor approval processes, can mitigate risks.

The ongoing threat underscores the importance of vigilance and robust security measures in the software development lifecycle. Developers and security teams must stay informed and proactive to protect against these sophisticated supply chain attacks.

The Hacker News Tags:AI-powered attacks, Cybersecurity, developer tokens, GitHub, Malware, NPM, open source security, PyPI, supply chain attack, TeamPCP

Post navigation

Previous Post: Auraboros RAT Unveiled: Live Surveillance and Data Theft
Next Post: Essential Phishing Defense Strategies for CISOs

Related Posts

Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More The Hacker News
AI Assistants Exploited as Malware Command Channels AI Assistants Exploited as Malware Command Channels The Hacker News
Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition The Hacker News
A Browser Extension Risk Guide After the ShadyPanda Campaign A Browser Extension Risk Guide After the ShadyPanda Campaign The Hacker News
CISA Flags Critical F5 BIG-IP Vulnerability Exploitation CISA Flags Critical F5 BIG-IP Vulnerability Exploitation The Hacker News
Russian Cyber Campaign Targets Ukraine with New Malware Russian Cyber Campaign Targets Ukraine with New Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Warning on Malicious KICS Docker Images and Extensions
  • Essential Phishing Defense Strategies for CISOs
  • Supply Chain Worm Exploits npm to Steal Developer Tokens
  • Auraboros RAT Unveiled: Live Surveillance and Data Theft
  • Claude Mythos AI Uncovers Numerous Firefox Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Warning on Malicious KICS Docker Images and Extensions
  • Essential Phishing Defense Strategies for CISOs
  • Supply Chain Worm Exploits npm to Steal Developer Tokens
  • Auraboros RAT Unveiled: Live Surveillance and Data Theft
  • Claude Mythos AI Uncovers Numerous Firefox Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark