Skip to main content
News Directory 3
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Menu
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
NPM Packages Steal Data from Windows, Linux, macOS - News Directory 3

NPM Packages Steal Data from Windows, Linux, macOS

November 2, 2025 Lisa Park Tech
News Context
At a glance
  • A ​sophisticated attack targeting⁣ developers has resulted in ​nearly 10,000 downloads of⁤ malicious packages on the Node Package ​Manager (npm), a ⁢critical ‍resource for​ JavaScript development.
  • The attackers employed a technique called typosquatting,⁤ creating package names that closely resemble popular and trusted libraries like ‌TypeScript, ⁣discord.js, and ​react-router-dom.
  • Following the CAPTCHA display, the script downloads a considerable 24MB executable built with PyInstaller, a tool for packaging ‌Python applications.
Original source: curierulnational.ro

Thousands‌ Hit⁢ by Malicious npm​ Packages Stealing Sensitive Data

Published on november 2,‍ 2024 at⁢ 00:25:44

A ​sophisticated attack targeting⁣ developers has resulted in ​nearly 10,000 downloads of⁤ malicious packages on the Node Package ​Manager (npm), a ⁢critical ‍resource for​ JavaScript development. Security researchers recently uncovered ten packages designed to steal⁤ sensitive information from windows, Linux, and macOS systems.

The attackers employed a technique called typosquatting,⁤ creating package names that closely resemble popular and trusted libraries like ‌TypeScript, ⁣discord.js, and ​react-router-dom. This subtle deception‌ aims to trick developers⁢ into inadvertently installing‌ the malicious code. Once installed,‌ a hidden script executes automatically.‍ This script initially presents a fake CAPTCHA, designed to appear ⁢legitimate and mask the underlying malicious activity.

Following the CAPTCHA display, the script downloads a considerable 24MB executable built with PyInstaller, a tool for packaging ‌Python applications. This executable is a multiplatform infostealer, capable of harvesting a wide range of sensitive data, including stored passwords, API tokens, and information directly from web ⁣browsers⁣ and ⁢credential managers. The stolen data ‌is then transmitted ‍to ⁣a command‍ and control server located at ⁣195.133.79.43.

Despite being reported ‌to npm, these malicious packages remain available as of ‌today, ‍November 2, ⁣2024.this underscores the challenges in rapidly addressing security threats within large ⁤package ‌repositories.

What You Need to⁣ Do Now

If⁤ you suspect you may have installed one of these malicious packages, immediate action is crucial. Experts reccommend the following steps:

  • Remove Infected Packages: Delete any ⁤potentially compromised ‌packages from your⁢ project.
  • Rotate Credentials: ​ change all⁢ passwords and regenerate API tokens ‍associated with your​ development ⁢environment and any services accessed through ​those credentials.
  • Verify Package Sources: Carefully scrutinize the source and legitimacy of all packages before⁢ installing them from public registries like npm. Double-check package names for​ subtle variations and ensure they originate⁤ from trusted developers.

This‌ incident serves as ⁤a ‍stark‌ reminder ⁣of the⁢ importance‌ of⁢ vigilance and ⁢robust security practices within the​ software‍ development ​lifecycle. ‌Regularly auditing dependencies and employing security ⁢scanning ⁤tools can definitely help ⁤mitigate the risk of ‌falling victim to similar‍ attacks.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Related

cyber attacks

Search:

News Directory 3

ByoDirectory is a comprehensive directory of businesses and services across the United States. Find what you need, when you need it.

Quick Links

  • Disclaimer
  • Terms and Conditions
  • About Us
  • Advertising Policy
  • Contact Us
  • Cookie Policy
  • Editorial Guidelines
  • Privacy Policy

Browse by State

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado

Connect With Us

© 2026 News Directory 3. All rights reserved.

Privacy Policy Terms of Service