Malware Targets Millions in npm and PyPI Supply Chain Attack

Published:

spot_img

Recent Cybersecurity Threats from Supply Chain Attacks

Cybersecurity experts have recently highlighted a significant supply chain attack impacting a range of packages related to GlueStack. This targeted approach has resulted in the deployment of malware that poses serious risks to developers and organizations reliant on these packages.

The Attack and Its Implications

According to Aikido Security, the malware was introduced via a specific modification to the lib/commonjs/index.js file. This malicious code enables attackers to execute shell commands, take screenshots, and upload files from compromised machines. Alarmingly, these packages collectively draw nearly one million downloads weekly, highlighting the potential reach of this breach.

Once attackers gain unauthorized access, they can perform various harmful actions, including cryptocurrency mining, theft of sensitive information, and even service disruptions. The initial compromise of the package was detected on June 6, 2025, signaling an alarming trend in cyber threats.

Impacted Packages

The following packages were found to contain the malicious code:

  • @gluestack-ui/utils, versions 0.1.16 and 0.1.17
  • @react-native-aria/button, version 0.2.11
  • @react-native-aria/checkbox, version 0.2.11
  • Other variants within the @react-native-aria suite

These packages represent a small fraction of the tools used by developers, underscoring the urgency for users to ensure their software dependencies remain secure.

Nature of the Malware

The malicious code implemented in these packages mirrors a remote access trojan linked to the recent compromise of the rand-user-agent npm package. This ongoing threat suggests that the same group of attackers might be orchestrating multiple modifications, raising concerns about the sophistication and coordination of their efforts.

The trojan has been upgraded to include additional commands that allow hackers to gather system information and identify the public IP of affected hosts. This level of access creates significant vulnerabilities for individual and enterprise users alike.

Response from Project Maintainers

In light of the discoveries, the maintainers of the affected packages have taken immediate action, revoking access tokens and marking the compromised versions as deprecated. Users who may have downloaded these versions are urged to revert to safe alternatives to mitigate any potential harm.

Recent Rogue npm Packages

In related news, Socket recently uncovered two unauthorized npm packages named express-api-sync and system-health-sync-api. Although they appear legitimate at first glance, these packages contain destructive features capable of erasing entire application directories.

The express-api-sync package falsely claims to facilitate data synchronization between databases. However, once integrated into a project, it executes malicious commands when it receives a specific hard-coded HTTP request, resulting in extensive data loss.

Conversely, the system-health-sync-api package exhibits more deceptive capabilities by harvesting information while simultaneously installing a wiper program. This sophisticated malware differentiates commands based on the operating system, enhancing its effectiveness in executing damaging operations.

Covert Communication Channels

Security researchers have pointed out that the system-health-sync-api employs email for covert communication, connecting to an attacker-controlled email address. This stealthy method of data exfiltration goes unnoticed by most firewalls, making it challenging for organizations to detect unauthorized activity.

The package establishes endpoints that allow attackers to execute destructive commands, making it crucial for developers to stay vigilant regarding the integrity of their software dependencies.

Python Package Harvesting Credentials

Additionally, a new Python-based malicious tool called imad213 has surfaced in the Python Package Index (PyPI), masquerading as an Instagram growth tool. Although marketed as a legitimate resource, it serves primarily to harvest user credentials.

Once activated, the malware prompts users for their Instagram login details, subsequently transmitting this information to multiple dubious bot services that participate in credential laundering. This emerging trend raises alarms about the future of social media-targeted attacks.

Managing the Threat Landscape

As cyber threats evolve, the importance of maintaining secure software ecosystems becomes increasingly clear. Developers must remain proactive in monitoring their packages and ensuring they utilize verified, safe versions. Awareness and action are key to preventing potential data breaches, system disruptions, and the overarching threat of evolving cybersecurity challenges.

In light of these recent developments, users and developers alike are urged to adopt more stringent security practices to protect against the growing threat of supply chain attacks.

spot_img

Related articles

Recent articles

Adapting Threat Intelligence for a New Era of Disruptive Generative AI

The Evolution of Cyber Threats: Adapting to a New Era of Generative AI In today's undeniably digital age, the landscape of cybersecurity is undergoing a...

Leverage Technology to Combat Dark Web Threats in Cross-Border E-Commerce, Says Revenue Secretary to DRI Official

Enhancing Revenue Intelligence: Adapting to New Threats Embracing Technological Advances In an era where illicit trade is becoming increasingly sophisticated, revenue intelligence agencies are faced with...

Experts Warn: A Major Cybersecurity Breach in Healthcare is Inevitable

Rising Cybersecurity Threats in Healthcare: A Looming Crisis The Stark Reality of Cyber Incidents Experts in the healthcare field are sounding the alarm on cybersecurity threats,...

Iranian and Egyptian Foreign Ministers Discuss Key Issues in Phone Call

Iran and Egypt Celebrate Eid al-Adha with Diplomatic Dialogue A Warm Exchange of Greetings In a significant diplomatic interaction, Iranian Foreign Minister Seyed Abbas Araghchi and...