Back

Massive npm Supply‑Chain Attack Compromises Hundreds of Packages

Massive npm Supply‑Chain Attack Compromises Hundreds of Packages
Ars Technica2

Overview of the Attack

Security researchers have identified a coordinated supply‑chain compromise affecting the npm repository, which serves more than 2 billion weekly downloads of JavaScript code. The breach involved the insertion of malicious code into nearly two dozen packages that are widely used across the open‑source ecosystem.

How the Intrusion Occurred

The attackers began by sending a phishing email that appeared to come from a domain created to mimic the official npm support address. The message warned the maintainer, known online as Qix, that his account would be closed unless he logged in and updated his two‑factor authentication (2FA) details. Falling for the ruse, Qix entered his credentials, giving the attackers access to his npm account.

Rapid Deployment of Malicious Code

Within roughly an hour of gaining access, the intruders pushed updates to dozens of packages under Qix’s stewardship. The added code, spanning more than 280 lines, monitors infected systems for cryptocurrency transactions and automatically redirects the payments to wallets controlled by the attackers.

Scope and Impact

The compromised packages include several foundational libraries that are both directly used and indirectly required by thousands of other npm packages. Because many projects depend on these core components, the malicious versions have the potential to affect a vast number of applications, libraries, and frameworks worldwide.

Expert Analysis

Security firm Socket highlighted the significant overlap with high‑profile projects, noting that the attackers deliberately targeted packages to maximize their reach. The researchers described the operation as a targeted attack designed to exploit the extensive dependency network inherent in modern software development.

Potential Consequences

Beyond the immediate risk of cryptocurrency theft, the incident underscores the vulnerability of open‑source supply chains to social engineering and credential compromise. It also raises concerns about the security of 2FA implementations when attackers can deceive developers through seemingly legitimate communications.

Used: News Factory APP - news discovery and automation - ChatGPT for Business

Source: Ars Technica2

Also available in: