Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

iPhone 17, iPhone Air, AirPods Pro 3, and everything else announced at Apple hardware events

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Tesla revamps its megapack in an attempt to turn its declining storage business around

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » 20 popular NPM packages with 2 billion weekly downloads compromised in supply chain attacks
Identity

20 popular NPM packages with 2 billion weekly downloads compromised in supply chain attacks

userBy userSeptember 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 9, 2025Ravi LakshmananCryptocurrency/Software Security

Multiple NPM packages have been compromised as part of a software supply chain attack after the maintainer’s account was compromised in a phishing attack.

The attack targeted Josh Junon (aka QIX) who received an email message mimicking NPM (support @npmjs[.]Help) and click on the embedded link to prompt you to update your two-factor authentication (2FA) credentials by September 10, 2025.

The phishing page is said to have prompted the co-mentor to enter a username, password, and a two-factor authentication (2FA) token.

Audit and subsequent

The next 20 packages that collectively attract more than 2 billion downloads each week have been confirmed to be affected as part of an incident –

ansi-regex@6.2.1 ansi-styles@6.2.2 backslash@0.2.1 chalk@5.6.1 chalk-template@1.1.1 color-convert@3.1.1 color-name@2.0.1 color-string@2.1.1 debug@4.4.2 error-ex@1.3.3 has-ansi@6.0.1 is-arrayish@0.3.3 proto-tinker-wc@1.8.7 supports-hyperlinks@4.1.1 simple-swizzle@0.2.3 slice-ansi@7.1.1 sprip-ansi@7.1.1 supports-hyperlinks@4.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.

“Sorry, I should have paid more attention,” Junon said in a Bruski post. “Not like me. I had a stressful week. I’ll work to clean this up.”

Analysis of obfuscated malware injected into the source code reveals that it is designed to intercept cryptocurrency transaction requests and exchange destination wallet addresses with closely matched attacker-controlled wallets by calculating Levenstenin distance.

According to Charlie Eriksen of Aikido Security, the payload acts as a browser-based interceptor that hijacks network traffic and application APIs to steal cryptocurrency assets by rewriting requests and answers. It is currently unknown who is behind the attack.

“The payload starts with checking the window of the type! == “Undefined” ensures that it is running in the browser,” says Socket. “Then connect to Window.fetch, xmlhttprequest, and window.ethereum.request, other wallet provider APIs.”

“This means that the malware targets end users with connected wallets that access sites that contain compromised code. Developers are not essentially targeted, but if you open an affected site in your browser and connect your wallet, you become a victim.”

Package ecosystems such as NPM and Python Package Index (PYPI) repeat targets for their popularity and wide reach within the developer community.

In addition to exposing malicious packages directly, attackers are also using techniques such as exploiting AI-Hallucinated dependencies to install malware, using AI-Hallucinated dependencies, known as slopestwing. The incident once demonstrates the need to exercise vigilance, strengthen the CI/CD pipeline and lock down dependencies.

CIS Build Kit

According to ReversingLabs’ 2025 Software Supply Chain Security Report, 14 of the 23 malicious crypto-related campaigns in 2024 target NPM, while the rest are linked to PYPI.

“What we’re seeing is the unfolding of choke and debugging of NPM packages is a unfortunately common instance in today’s software supply chain,” Sonatype’s field CTO Ilkka Turunen told Hacker News.

“While malicious payloads focused on cryptographic theft, this acquisition follows the classic attacks that are now established. By taking over a common open source package, the enemy steals secrets, leaves behind the background and penetrates the organization.”

“Targeting developers of these packages was not a random choice. Package acquisitions have become the standard tactic for advanced permanent threat groups like Lazarus because they know that by infiltrating a single underfunded project, they can reach a large number of developer populations around the world.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article45 Previously unreported domain reveals long-standing salt typhoon cyberspy
Next Article The increasing urgency of PFAS destruction
user
  • Website

Related Posts

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

September 9, 2025

Axios Abuse and Salty2FA Kit Fuel Advanced Microsoft 365 Fishing Attack

September 9, 2025

Raton Android Malware Detected with NFC Relay and ATS Banking Fraud Features

September 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

iPhone 17, iPhone Air, AirPods Pro 3, and everything else announced at Apple hardware events

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Tesla revamps its megapack in an attempt to turn its declining storage business around

New emojis include Bigfoot, Orca whales, Treasure Chests and more

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Wearable Tech Deep Dive: The Science Behind Smartwatches and Your Health Goals

The Adaptable Healthcare Playbook: How TwinH Is Leading the Way

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.