Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Phantom Phishing Attack: The Great NPM Supply Chain Heist



Malware injected into popular npm packages after maintainer tokens stolen in phishing attack highlights the growing threat of supply chain attacks and the importance of cybersecurity measures for developers.

  • Six popular npm packages have been compromised after their maintainers' tokens were stolen in a phishing attack.
  • The affected packages include eslint-config-prettier, eslint-plugin-prettier, synckit, @pkgr/core, napi-postinstall, and versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7 of the latter two.
  • The attackers exploited vulnerabilities in these packages by capturing their maintainer tokens to publish malicious versions on the npm registry.
  • The phishing campaign was highly sophisticated, impersonating npm and capturing login information from victims.
  • Socket recommends that developers roll back to safe versions, check for compromised packages, and turn on two-factor authentication for accounts.
  • The incident highlights the need for cybersecurity awareness among developers and the importance of maintaining good security hygiene practices.


  • In a recent incident that has sent shockwaves through the developer community, six popular npm packages have been compromised after their maintainers had their tokens stolen in a phishing attack. The malicious activity, carried out by an individual or group using sophisticated phishing tactics, resulted in the installation of malware into these widely used packages. This development underscores the need for developers to be vigilant and proactive when it comes to protecting themselves against such attacks.

    The affected npm packages include eslint-config-prettier, eslint-plugin-prettier, synckit, @pkgr/core, napi-postinstall, and version 8.10.1, 9.1.1, 10.1.6, and 10.1.7 of the latter two. The attackers exploited vulnerabilities in these packages by capturing their maintainer tokens, which were then used to publish malicious versions of the code directly onto the npm registry without any source code commits or pull requests being made on their respective GitHub repositories.

    According to Socket, a software supply chain security firm that identified and disclosed the attack, "The injected code attempted to execute a DLL on Windows machines, potentially allowing remote code execution." This finding highlights the severity of the threat posed by this attack and underscores the need for developers to be cautious when using compromised packages.

    The phishing campaign used in the attack appears to have been highly sophisticated. According to Socket, it involved sending email messages impersonating npm, with a subject line that read "Please verify your email address." The emails appeared to come from legitimate addresses associated with npm, including "support@npmjs[.]org," and urged recipients to click on a link embedded in the message.

    Upon clicking on the link, victims were redirected to a bogus landing page that was designed to capture their login information. It is likely that this information will be used by the attackers to further compromise the affected packages.

    The development comes at a time when cybersecurity threats are increasingly becoming more sophisticated and targeted. The use of phishing attacks to steal maintainers' tokens is just one example of how attackers can exploit vulnerabilities in software supply chains.

    In response to the attack, Socket recommends that developers who use the affected packages should roll back to safe versions and check their installed packages to ensure they have not been compromised. Project maintainers are also advised to turn on two-factor authentication for their accounts and use scoped tokens instead of passwords for publishing packages.

    Furthermore, this incident highlights the need for cybersecurity awareness among developers. Many developers may be unaware of the potential risks associated with using compromised packages or the importance of maintaining good security hygiene practices.

    The attack also serves as a reminder that supply chain attacks can have far-reaching consequences. In this case, the malicious activity was confined to the npm registry, but it is possible that the malware could have spread more widely if not for the quick action of Socket in identifying and disclosing the issue.

    The incident is a stark reminder that cybersecurity is everyone's responsibility. Developers must take proactive steps to protect themselves against such attacks, including being cautious when using compromised packages and implementing robust security measures to safeguard their code.

    In addition to the attack on npm packages, there have been other recent incidents involving malicious software deployed through supply chain attacks. For example, Arch Linux recently removed three AUR packages that had installed a remote access trojan called Chaos RAT from a now-removed GitHub repository.

    The affected packages were "librewolf-fix-bin," "firefox-patch-bin," and "zen-browser-patched-bin." The attack highlights the need for developers to be vigilant in monitoring their software dependencies and taking swift action when they identify potential vulnerabilities.

    In conclusion, the recent incident involving malware injected into popular npm packages after maintainer tokens stolen in a phishing attack serves as a stark reminder of the growing threat of supply chain attacks. It underscores the importance of cybersecurity measures for developers and highlights the need for greater awareness and vigilance in protecting against such threats.

    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-Phantom-Phishing-Attack-The-Great-NPM-Supply-Chain-Heist-ehn.shtml

  • https://thehackernews.com/2025/07/malware-injected-into-6-npm-packages.html


  • Published: Sun Jul 20 05:42:09 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us