Malware Targets Millions in npm and PyPI Supply Chain Attack

Published:

spot_img

Recent Cybersecurity Threats from Supply Chain Attacks

Cybersecurity experts have recently highlighted a significant supply chain attack impacting a range of packages related to GlueStack. This targeted approach has resulted in the deployment of malware that poses serious risks to developers and organizations reliant on these packages.

The Attack and Its Implications

According to Aikido Security, the malware was introduced via a specific modification to the lib/commonjs/index.js file. This malicious code enables attackers to execute shell commands, take screenshots, and upload files from compromised machines. Alarmingly, these packages collectively draw nearly one million downloads weekly, highlighting the potential reach of this breach.

Once attackers gain unauthorized access, they can perform various harmful actions, including cryptocurrency mining, theft of sensitive information, and even service disruptions. The initial compromise of the package was detected on June 6, 2025, signaling an alarming trend in cyber threats.

Impacted Packages

The following packages were found to contain the malicious code:

  • @gluestack-ui/utils, versions 0.1.16 and 0.1.17
  • @react-native-aria/button, version 0.2.11
  • @react-native-aria/checkbox, version 0.2.11
  • Other variants within the @react-native-aria suite

These packages represent a small fraction of the tools used by developers, underscoring the urgency for users to ensure their software dependencies remain secure.

Nature of the Malware

The malicious code implemented in these packages mirrors a remote access trojan linked to the recent compromise of the rand-user-agent npm package. This ongoing threat suggests that the same group of attackers might be orchestrating multiple modifications, raising concerns about the sophistication and coordination of their efforts.

The trojan has been upgraded to include additional commands that allow hackers to gather system information and identify the public IP of affected hosts. This level of access creates significant vulnerabilities for individual and enterprise users alike.

Response from Project Maintainers

In light of the discoveries, the maintainers of the affected packages have taken immediate action, revoking access tokens and marking the compromised versions as deprecated. Users who may have downloaded these versions are urged to revert to safe alternatives to mitigate any potential harm.

Recent Rogue npm Packages

In related news, Socket recently uncovered two unauthorized npm packages named express-api-sync and system-health-sync-api. Although they appear legitimate at first glance, these packages contain destructive features capable of erasing entire application directories.

The express-api-sync package falsely claims to facilitate data synchronization between databases. However, once integrated into a project, it executes malicious commands when it receives a specific hard-coded HTTP request, resulting in extensive data loss.

Conversely, the system-health-sync-api package exhibits more deceptive capabilities by harvesting information while simultaneously installing a wiper program. This sophisticated malware differentiates commands based on the operating system, enhancing its effectiveness in executing damaging operations.

Covert Communication Channels

Security researchers have pointed out that the system-health-sync-api employs email for covert communication, connecting to an attacker-controlled email address. This stealthy method of data exfiltration goes unnoticed by most firewalls, making it challenging for organizations to detect unauthorized activity.

The package establishes endpoints that allow attackers to execute destructive commands, making it crucial for developers to stay vigilant regarding the integrity of their software dependencies.

Python Package Harvesting Credentials

Additionally, a new Python-based malicious tool called imad213 has surfaced in the Python Package Index (PyPI), masquerading as an Instagram growth tool. Although marketed as a legitimate resource, it serves primarily to harvest user credentials.

Once activated, the malware prompts users for their Instagram login details, subsequently transmitting this information to multiple dubious bot services that participate in credential laundering. This emerging trend raises alarms about the future of social media-targeted attacks.

Managing the Threat Landscape

As cyber threats evolve, the importance of maintaining secure software ecosystems becomes increasingly clear. Developers must remain proactive in monitoring their packages and ensuring they utilize verified, safe versions. Awareness and action are key to preventing potential data breaches, system disruptions, and the overarching threat of evolving cybersecurity challenges.

In light of these recent developments, users and developers alike are urged to adopt more stringent security practices to protect against the growing threat of supply chain attacks.

spot_img

Related articles

Recent articles

Discover Six Flags Qiddiya: Opening Date, Ticket Prices, and 28 Record-Breaking Rides

Discovering Qiddiya City: A New Era of Entertainment An Overview of Qiddiya City Nestled in the stunning Tuwaiq Mountains and just a 40-minute drive from Riyadh,...

Five Plead Guilty for Aiding North Korean Hackers in Breaching 136 Companies

U.S. Justice Department Takes Action Against North Korean Fraud Network On Friday, the U.S. Department of Justice (DoJ) announced significant developments in the ongoing fight...

127 Organizations Rally Against Proposed Changes to GDPR and EU Data Protection Laws

A coalition of 127 civil society organizations and trade unions has come together to express their opposition to proposed modifications that they...

Washington Post Confirms Data Breach: CL0P Claims Over 40 Oracle Targets

The Washington Post has confirmed that it recently suffered a data breach linked to a concentrated threat campaign exploiting vulnerabilities...