Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Canva launches unique design model, adds new AI capabilities to platform

Google’s AI defenses built into Android now block 10 billion fraudulent messages per month

Russian ransomware gang weaponizes open source AdaptixC2 for advanced attacks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » 126 PhantomRaven malware found in npm packages to steal GitHub tokens from developers
Identity

126 PhantomRaven malware found in npm packages to steal GitHub tokens from developers

userBy userOctober 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 30, 2025Ravi LakshmananDevSecOps / Software Security

Cybersecurity researchers have discovered another active software supply chain attack campaign targeting the npm registry that contains over 100 malicious packages that can steal authentication tokens, CI/CD secrets, and GitHub credentials from developer machines.

The campaign has been codenamed PhantomRaven by Koi Security. This activity is estimated to have started in August 2025, when the first package was uploaded to the repository. Since then, we’ve grown to a total of 126 npm libraries and amassed over 86,000 installations.

DFIR retainer service

Some packages are also flagged by DevSecOps company DCODX.

op-cli-installer (486 downloads) used-imports (1,350 downloads) badkit-api-client (483 downloads) Polyfill-corejs3 (475 downloads) eslint-comments (936 downloads)

What makes this attack unique is the attacker’s pattern of hiding malicious code in dependencies by specifying a custom HTTP URL, and then retrieving the malicious code from a website that npm does not trust (in this case, “packages.storeartifact”).[.]com”), as opposed to npmjs[.]com each time a package is installed.

“And npmjs[.]com is not following those URLs,” security researcher Oren Yomtov said in a report shared with The Hacker News. “Security scanners will not pick up those URLs; dependency analysis tools will ignore them. These packages will show up as ‘0 dependencies’ to all automated security systems.” ”

Even more worrying, the fact that the URL is controlled by the attacker means that it can be exploited by malicious actors to tweak the payload and deliver all sorts of malware, making it more stealthy by first providing completely benign code before pushing out malicious versions of dependencies once the package has been widely adopted.

The attack chain begins as soon as a developer installs one of the “secure” packages, retrieving remote dynamic dependencies (RDDs) from an external server. The malicious package comes with a preinstallation hook that triggers the execution of the main payload.

The malware is designed to scan email addresses in the development environment, gather information about the CI/CD environment, collect system fingerprints including public IP addresses, and exfiltrate the results to a remote server.

CIS build kit

Koi Security said that the choice of package names is not random, and that the attackers are using a phenomenon called slopsquatting, where large-scale language models (LLMs) hallucinate non-existent but plausible-sounding package names, to register these packages.

“PhantomRaven shows how advanced attackers conduct their attacks. [better] “It’s hard to exploit the blind spots of traditional security tools,” Yomtov said, adding, “Remote dynamic dependencies are invisible to static analysis. AI illusions create plausible-sounding package names that developers trust, and lifecycle scripts run automatically without user interaction.”

This development once again shows how threat actors are finding new ways to hide malicious code in the open source ecosystem and fly under the radar.

“The npm ecosystem makes publishing packages easier and less frictional,” DCODX said. “Lifecycle scripts (preinstallation, installation, postinstallation) execute arbitrary code during installation, often without the developer’s knowledge.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFrom 6G connectivity to sustainable innovation
Next Article The truth about EV lifecycle emissions revealed
user
  • Website

Related Posts

Google’s AI defenses built into Android now block 10 billion fraudulent messages per month

October 30, 2025

Russian ransomware gang weaponizes open source AdaptixC2 for advanced attacks

October 30, 2025

New ‘brazen’ exploit instantly crashes Chromium browser with a single malicious URL

October 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Canva launches unique design model, adds new AI capabilities to platform

Google’s AI defenses built into Android now block 10 billion fraudulent messages per month

Russian ransomware gang weaponizes open source AdaptixC2 for advanced attacks

New ‘brazen’ exploit instantly crashes Chromium browser with a single malicious URL

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.