Advertisement · 728 × 90
#
Hashtag
#npmPackage
Advertisement · 728 × 90
Preview
UNC1069 Uses Social Engineering to Hijack Axios npm Package via Maintainer   A sophisticated social engineering operation by UNC1069 has led to the compromise of the widely used Axios npm package, raising serious concerns across the JavaScript ecosystem. The attack targeted a member of the Axios project’s maintainer team by masquerading as a legitimate Apache Software Foundation representative, using forged email domains and a fake Jira‑style ticket management system to drive the victim into installing a malicious version of the Axios GitHub Assistant browser extension.  Once installed, the extension granted UNC1069 broad access to the maintainer’s GitHub account, enabling them to introduce a malicious update to the Axios package and push the compromised code to npm. The attack chain highlights how trusted communication channels—such as seemingly official emails and project‑related ticketing systems—can be weaponized to bypass technical safeguards. By impersonating Apache staff and leveraging the perceived legitimacy of the GitHub Assistant tool, the threat actors manipulated the maintainer into unintentionally installing a malicious browser extension.  The extension then captured the maintainer’s GitHub cookies and session tokens, which allowed UNC1069 to log in, survey the project, and ultimately publish a malicious version of Axios. This incident underscores that even projects with strong code‑review practices are vulnerable when human‑factor controls and identity‑verification steps are overlooked. Although the malicious Axios package was not directly downloaded more than a handful of times, the episode triggered a sharp spike in removals of older Axios releases from the npm registry.  This suggests that many developers likely removed the package from projects preemptively to mitigate potential supply‑chain exposure. The fact that the malicious package was quickly removed after detection indicates that npm’s monitoring and incident‑response mechanisms responded promptly; however, the broader damage lies in the erosion of trust and the disruption to downstream projects that depend on Axios. Maintainers and organizations are now forced to revisit their authentication workflows and rethink how they verify communications from partners or foundation staff. A xios has since published a security update and clarified that the malicious package was an isolated, short‑lived incident in the npm registry. The project’s team has emphasized the importance of using multi‑factor authentication, hardening account security, and limiting third‑party extension access to critical accounts. Security teams are also being advised to audit any browser extensions granted to corporate or critical‑project accounts and to treat unsolicited tools or utilities—especially those tied to “official” infrastructure—as potential red flags. Moving forward, the Axios team is expected to tighten collaboration rules with foundations and external organizations to reduce the risk of similar impersonation‑driven attacks.  The UNC1069‑Axios incident serves as a stark reminder that software supply‑chain security is only as strong as its weakest human link. Social engineering continues to be a highly effective vector for attackers, especially when paired with technical infrastructure that appears legitimate. For developers and organizations, this event reinforces the need for layered defenses: robust technical safeguards, strict identity‑verification protocols, and continuous security awareness training. As open‑source projects become increasingly central to modern software stacks, protecting maintainers’ accounts and communication channels must be treated with the same urgency as protecting the code itself.

UNC1069 Uses Social Engineering to Hijack Axios npm Package via Maintainer #Axios #CyberAttacks #NPMPackage

1 0 1 0
Post image

Anthropic accidentally exposed Claude Code's source code via an npm packaging error in version 2.1.88, including a 59.8 MB source map

Read Full Article: deccanfounders.com/2026/01/news...

#Anthropic #Claude #ClaudeCode #npmpackage #CodeExpose #AIFeatures #DeccanFounders

1 0 0 0
Preview
Malicious NuGet Packages Stole ASP.NET Data npm Package Dropped Malware setting up a local proxy on localhost read more about Malicious NuGet Packages Stole ASP.NET Data npm Package Dropped Malware

Malicious NuGet Packages Stole ASP. NET Data; npm Package Dropped Malware reconbee.com/malicious-nu...

#malicious #NuGetpackages #NuGet #npmpackage #malware #malwareattack

0 0 0 0
Preview
Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Base64-encoded PowerShell script that read more about Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package reconbee.com/hackers-expl...

#hackers #metro4shell #RCE #reactnative #CLI #npmpackage #hacking #hacked

0 0 0 0
Preview
Malicious NPM Package with 56K Downloads Steals WhatsApp Messages Malicious npm package lotusbail stole WhatsApp data from developers while posing as a functional WhatsApp Web API library.

Malicious NPM Package with 56K Downloads Steals WhatsApp Messages
cybersecuritynews.com/malicious-np...

#Infosec #Security #Cybersecurity #CeptBiro #NPMPackage #Steals #WhatsAppMessages

0 0 0 0
Preview
Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories npm-stat data it has been downloaded a total read more about Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories

Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories reconbee.com/researchers-...

#malicious #npmpackage #GitHub #githubsecurity #repositories #cybersecurity #cyberattack

3 1 0 0
Preview
Shai-Hulud Worm Strikes: Self-Replicating Malware Infects Hundreds of NPM Packages  A highly dangerous self-replicating malware called “Shai-Hulud” has recently swept through the global software supply chain, becoming one of the largest incidents of its kind ever documented.  Named after the sandworms in the Dune series, this worm has infected hundreds of open-source packages available on the Node Package Manager (NPM) platform, which is widely used by JavaScript developers and organizations worldwide.  Shai-Hulud distinguishes itself from previous supply chain attacks by being fully automated: it propagates by stealing authentication tokens from infected systems and using them to compromise additional software packages, thus fueling a rapid, worm-like proliferation. The attack vector starts when a developer or system installs a poisoned NPM package. The worm then scans the environment for NPM credentials, specifically targeting authentication tokens, which grant publishing rights. Upon finding such tokens, it not only corrupts the compromised package but also infects up to twenty of the most popular packages accessible to that credential, automatically publishing malicious versions to the NPM repository.  This creates a domino effect—each newly infected package targets additional developers, whose credentials are then used to expand the worm’s grip, further cascading the spread across the global development community. Researchers from various security firms, including CrowdStrike and Aikido, were among those affected, though CrowdStrike quickly removed impacted packages and rotated its credentials. Estimates of the scale vary: some report at least 180 packages infected, while others cite figures above 700, underscoring the scope and severity of the outbreak.  Major tools used by the worm, such as TruffleHog, enabled it to scan compromised systems for a broad array of secrets, including API and SSH keys, as well as cloud tokens for AWS, Azure, and Google Cloud, making its impact particularly far-reaching. Response to the attack involved urgent removals of poisoned software, rotations of compromised credentials, and investigations by platform maintainers. Security experts argued for immediate industry reforms, recommending that package managers like NPM require explicit human approval and use robust, phishing-resistant two-factor authentication on all publishing operations.  The attack also exposed the vulnerabilities inherent in modern open-source ecosystems, where a single compromised credential or package can threaten countless downstream systems and organizations. This incident highlights the evolving tactics of cyber attackers and the critical need for improved security measures throughout the global software supply chain.

Shai-Hulud Worm Strikes: Self-Replicating Malware Infects Hundreds of NPM Packages #MaliciousCampaign #malware #NPMPackage

0 0 0 0
Preview
DuckDB Packages Compromised in Latest NPM Supply Chain Attack NPM Supply Chain Massive Security Breach

🔥 The NPM supply chain attack just got bigger!
DuckDB database packages have been compromised with crypto-stealing malware. A simple phishing email led to packages used by thousands of developers being infected.
www.cyberkendra.com/2025/09/duck...

#supplychain #npmPackage #npmattack #hack

0 0 0 0
Preview
Malicious npm Packages Impersonate Flashbots Steal Ethereum Wallet Keys (MEV) on the Ethereum network read more about Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys

Malicious npm Packages Impersonate Flashbots Steal Ethereum Wallet Keys reconbee.com/malicious-np...

#malicious #npmPackage #Flashbots #Ethereum #Ethereumwalletkey

0 0 0 0
Post image

Check SMS messages in your Node.js apps with MailSlurp—read texts from real numbers using a simple npm package.

#NodeJS #SMSAPI #MailSlurp #JavascriptDev #TextMessage #NPMPackage

www.youtube.com/watch?v=QL9V...

0 0 0 0
Preview
NPM package ‘is’ with 2.8M weekly downloads infected devs with malware The popular NPM package 'is' has been compromised in a supply chain attack that injected backdoor malware, giving attackers full access to compromised devices.

NPM package ‘is’ with 2.8M weekly downloads infected devs with malware
www.bleepingcomputer.com/news/securit...

#Infosec #Security #Cybersecurity #CeptBiro #NPMpackage #Devs #Malware

1 0 0 0
Preview
Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT install it on Windows systems read more about Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT

Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT reconbee.com/malicious-ob...

#NPMpackage #disguised #Ethereumtool #QuasarRAT #RAT #remoteaccesstrojan #cybersecurity #cybersec #cyberattacks

1 0 0 0