{"id":3073,"date":"2025-05-07T12:34:29","date_gmt":"2025-05-07T12:34:29","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=3073"},"modified":"2025-05-07T12:34:29","modified_gmt":"2025-05-07T12:34:29","slug":"hackers-booby-trap-npm-with-cross-language-imposter-packages","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=3073","title":{"rendered":"Hackers booby trap NPM with cross-language imposter packages"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Hackers are abusing the Node Package Manager (NPM) registry \u2014 a database of JavaScript packages \u2014 to target multi-language developers with typo-squatted packages containing stealers and remote code execution (RCE) codes.<\/p>\n<p>According to a research by cybersecurity firm Socket, a coordinated malware campaign, with evidence of origin in China, has published dozens of malicious packages that mimic well-known Python, Java, C++, .NET, and Node.js libraries.<\/p>\n<p>\u201cThis tactic may specifically target developers familiar with multiple programming languages, tricking them into installing malicious packages due to familiar-sounding package names, which appear unexpectedly in the npm registry instead of their original ecosystem,\u201d said Socket researchers in a <a href=\"https:\/\/socket.dev\/blog\/npm-targeted-by-malware-campaign-mimicking-familiar-library-names\" target=\"_blank\" rel=\"noopener\">blog post<\/a>.<\/p>\n<p>The booby-trapped packages used in the campaign pack obfuscated code, designed to slip past security defences, run malicious scripts to siphon off sensitive data, and establish persistence on affected systems.<\/p>\n<h2 class=\"wp-block-heading\">A coordinated attack is at play<\/h2>\n<p>All the packages observed by the researchers exhibited similar obfuscation techniques with the end goal of enabling data exfiltration or RCE. Attackers planted the malicious packages in NPM, hoping either multi-language developers accidentally pick them up for their familiar names, or CI\/CD systems automatically install them.<\/p>\n<p>Researchers were also able to link the campaign to China, adding another layer to the <a href=\"https:\/\/www.csoonline.com\/article\/3605085\/us-says-china-conducted-massive-espionage-through-breached-telcos.html\">growing cyberspace tension<\/a> between the US and China. \u201cAlthough these packages list different maintainers, analysis revealed that they share infrastructure, use identical obfuscated payloads, and point to the same IP address 8[.]152[.]163[.]60 confirming a single, coordinated threat actor targeting developers across ecosystems,\u201d the researchers at Socket said.<\/p>\n<p>The IP address was traced back to an address located in the Beijing region of China associated with Alibaba Cloud (Singapore), researchers added.<\/p>\n<p>Considering every malware sample retrieved consisted of a persistence module, a nation-state involvement cannot be entirely ruled out. The researchers said, \u201cpackages contain code that attempts persistence or lateral movement via installation of remote shell scripts.\u201d<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Auditing and blocking suspicious dependencies might help<\/h2>\n<p>Developers are recommended to audit dependencies within Node.js project snapshots, such as package.json and package-lock.json, that can fish out malicious installations within the dependency tree. Blocking suspicious packages with a proxy registry or allowlist policy might also help.<\/p>\n<p>Training developers to recognize typosquatting and package impersonation is becoming critical amid growing supply chain threats using similar techniques. Attackers recently got creative as they <a href=\"https:\/\/www.csoonline.com\/article\/3961304\/ai-hallucinations-lead-to-new-cyber-threat-slopsquatting.html\">weaponized AI hallucinations<\/a> to distribute malicious packages with fake names that AI models recommended in their outputs. <\/p>\n<p>NPM remains a <a href=\"https:\/\/www.csoonline.com\/article\/572015\/npm-javascript-registry-suffers-massive-influx-of-malware-report-says.html\">popular hacker hideout<\/a> as they have been using it to carry out supply chain breaches. Socket shared a <a href=\"https:\/\/socket.dev\/blog\/npm-targeted-by-malware-campaign-mimicking-familiar-library-names#:~:text=Each%20package%20links%20directly%20to%20its%20Socket%20analysis%20page%2C%20showing%20the%20main.js%20file%20and%20behavior%20summary:\" target=\"_blank\" rel=\"noopener\">list of malicious packages<\/a> used in the campaign, along with other indicators and <a href=\"https:\/\/socket.dev\/blog\/npm-targeted-by-malware-campaign-mimicking-familiar-library-names#:~:text=MITRE%20ATT&amp;CK%20-%20Key%20Tactics%20&amp;%20Techniques\" target=\"_blank\" rel=\"noopener\">MITRE ATT&amp;CK<\/a> techniques.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Hackers are abusing the Node Package Manager (NPM) registry \u2014 a database of JavaScript packages \u2014 to target multi-language developers with typo-squatted packages containing stealers and remote code execution (RCE) codes. According to a research by cybersecurity firm Socket, a coordinated malware campaign, with evidence of origin in China, has published dozens of malicious packages [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":3074,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-3073","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/3073"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3073"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/3073\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/3074"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}