JQuery Attack Targets NPM and GitHub, Able to Extract Web Form Data

Published:

spot_img

Trojanized jQuery Attack Spreading on npm and GitHub: Researchers Discover

A trojanized version of jQuery has been discovered spreading on the npm JavaScript package manager, GitHub, and other platforms, posing a significant threat to developers and website owners. Security researchers from Phylum have been tracking this “persistent supply chain attacker” since May 26, uncovering compromised versions of jQuery in numerous packages across various domains.

The malicious packages are designed to extract website form data and send it to multiple URLs, showcasing a high level of variability and customization by the attacker. This unique attack method involves modifying the end function of jQuery to include additional malicious code, cleverly hidden within the animation utilities.

What makes this attack particularly concerning is the ad-hoc nature of the packages, the inclusion of personal files not typically found in npm publications, and the manual assembly and publication process. Despite the specific conditions required to trigger the malware, the widespread distribution of these packages increases the potential impact on unsuspecting developers.

To protect against supply chain threats like this, developers are advised to download packages only from trusted sources, regularly update and patch their projects, verify package signatures, and utilize package security tools. This incident serves as a reminder of the evolving complexity and reach of supply chain threat actors, highlighting the importance of vigilance and proactive security measures in the development process.

spot_img

Related articles

Recent articles

Empowering Women: ECOWAS Retreat Celebrates Purpose and Power for International Women’s Day 2025

Celebrating 50 Years of ECOWAS: Committing to Gender Empowerment As the Economic Community of West African States (ECOWAS) marks its 50th anniversary, a significant retreat...

PumaBot: New Botnet Aims at Linux IoT Devices to Hijack SSH Credentials and Mine Cryptocurrency

New PumaBot Botnet Targets Embedded Linux IoT Devices Overview of PumaBot A new botnet named PumaBot is specifically targeting embedded Linux-based Internet of Things (IoT) devices,...

Is Your IRS Refund Check on the Dark Web? Discover What 7 On Your Side Investigates

Surge in Check Theft: How California Residents Are Being Targeted The sun might shine brightly in California, but it casts dark shadows when it comes...

Microsoft OneDrive Flaw Allows Apps Full Cloud Access with Single File Upload

Security Flaw Discovered in Microsoft OneDrive File Picker Published on May 28, 2025 by Ravie Lakshmanan Tags: Data Privacy, Vulnerability A Serious Security Vulnerability Recent findings from cybersecurity...