10 Malicious npm Packages with Auto-Run Feature

Source: Cyber Security News

Recently, the npm ecosystem encountered a serious threat as ten malicious packages were discovered that execute automatically during installation. These packages are engineered to steal credentials through a sophisticated multi-stage infection process. Utilizing typosquatting techniques, they imitate popular JavaScript libraries, making detection challenging for developers. Once installed, the malware triggers a fake CAPTCHA to deceive users, allowing it to collect sensitive data without raising alarms. Upon execution, it connects to a remote server to send stolen information that includes authentication tokens and API keys for various services. Each malicious package employs advanced coding techniques to ensure stealth and effectiveness.

The complexity of this malware is evident in its four layers of obfuscation, which hinder traditional security analyses. It integrates with different operating systems by detecting the environment of the infected device—Windows, Linux, or macOS—executing tailored commands to maintain a low profile. Moreover, the postinstall lifecycle hook used by npm enables the malware to run immediately without any user suspicion, further complicating detection efforts. As a result, this attack serves as a reminder of the increasing sophistication of supply chain compromises targeting the development community, with thousands of downloads before discovery.

👉 Pročitaj original: Cyber Security News