{"id":6710,"date":"2025-09-16T06:38:47","date_gmt":"2025-09-16T06:38:47","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=6710"},"modified":"2025-09-16T06:38:47","modified_gmt":"2025-09-16T06:38:47","slug":"40-npm-packages-compromised-in-provide-chain-assault-utilizing-bundle-js-to-steal-credentials","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=6710","title":{"rendered":"40 npm Packages Compromised in Provide Chain Assault Utilizing bundle.js to Steal Credentials"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Sep 16, 2025<\/span><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><\/span><span class=\"p-tags\">Malware \/ Cyber Assault<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjS_YOeydLAlQ9uG63pTINB3QdaSSEhATMNZfCUGatfAgVrEJImME3VxV7EVSABpR4mVnb4wDSo3_4sITiXidfobQvJENPJyUbTjkgkpgbBcr_dvM4LInO2dUsAvsmzJ-ND9s1F4jL1gv8i1t4n3CQT0sohCV8MJnrGKZVzNoLLV8j7ASliIr_c_V9QdNck\/s728-rw-e365\/npm.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjS_YOeydLAlQ9uG63pTINB3QdaSSEhATMNZfCUGatfAgVrEJImME3VxV7EVSABpR4mVnb4wDSo3_4sITiXidfobQvJENPJyUbTjkgkpgbBcr_dvM4LInO2dUsAvsmzJ-ND9s1F4jL1gv8i1t4n3CQT0sohCV8MJnrGKZVzNoLLV8j7ASliIr_c_V9QdNck\/s728-rw-e365\/npm.jpg\" alt=\"\" border=\"0\" data-original-height=\"380\" data-original-width=\"728\"\/><\/a><\/div>\n<p>Cybersecurity researchers have flagged a recent software program provide chain assault concentrating on the npm registry that has affected greater than 40 packages that belong to a number of maintainers.<\/p>\n<p>&#8220;The compromised variations embody a operate (NpmModule.updatePackage) that downloads a package deal tarball, modifies package deal.json, injects a neighborhood script (bundle.js), repacks the archive, and republishes it, enabling computerized trojanization of downstream packages,&#8221; provide chain safety firm Socket <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/socket.dev\/blog\/tinycolor-supply-chain-attack-affects-40-packages\" rel=\"noopener\" target=\"_blank\">stated<\/a>.<\/p>\n<p>The tip objective of the marketing campaign is to go looking developer machines for secrets and techniques utilizing TruffleHog&#8217;s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/trufflesecurity\/trufflehog\" rel=\"noopener\" target=\"_blank\">credential scanner<\/a> and transmit them to an exterior server beneath the attacker&#8217;s management. The assault is able to concentrating on each Home windows and Linux programs.<\/p>\n<div class=\"dog_two clear\"><center class=\"cf\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.uk\/exec-guide-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Audit and Beyond\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiltRKezUVuLX-xwfkZiFwXSjhzM78kfYMEVXGqno4QaNyV1fxRBYs70XxlSzVxOgATgRJhN2OjOkynY8IVdWe5cojZ_YsIpd9ShTJ4DoGznMPm2dgKmYafzkfIvB3M6PrRwfuTONV0avZHvfnw2sKhM7l29dEAJchD4dnHUR4kLI6O6bixYv9Ftj-OkxZY\/s728-e100\/sy-d.png\" width=\"729\" height=\"91\"\/><\/a><\/center><\/div>\n<p>The next packages have been recognized as impacted by the incident &#8211;<\/p>\n<ul>\n<li>angulartics2@14.1.2<\/li>\n<li>@ctrl\/deluge@7.2.2<\/li>\n<li>@ctrl\/golang-template@1.4.3<\/li>\n<li>@ctrl\/magnet-link@4.0.4<\/li>\n<li>@ctrl\/ngx-codemirror@7.0.2<\/li>\n<li>@ctrl\/ngx-csv@6.0.2<\/li>\n<li>@ctrl\/ngx-emoji-mart@9.2.2<\/li>\n<li>@ctrl\/ngx-rightclick@4.0.2<\/li>\n<li>@ctrl\/qbittorrent@9.7.2<\/li>\n<li>@ctrl\/react-adsense@2.0.2<\/li>\n<li>@ctrl\/shared-torrent@6.3.2<\/li>\n<li>@ctrl\/tinycolor@4.1.1, @4.1.2<\/li>\n<li>@ctrl\/torrent-file@4.1.2<\/li>\n<li>@ctrl\/transmission@7.3.1<\/li>\n<li>@ctrl\/ts-base32@4.0.2<\/li>\n<li>encounter-playground@0.0.5<\/li>\n<li>json-rules-engine-simplified@0.2.4, 0.2.1<\/li>\n<li>koa2-swagger-ui@5.11.2, 5.11.1<\/li>\n<li>@nativescript-community\/gesturehandler@2.0.35<\/li>\n<li>@nativescript-community\/sentry 4.6.43<\/li>\n<li>@nativescript-community\/textual content@1.6.13<\/li>\n<li>@nativescript-community\/ui-collectionview@6.0.6<\/li>\n<li>@nativescript-community\/ui-drawer@0.1.30<\/li>\n<li>@nativescript-community\/ui-image@4.5.6<\/li>\n<li>@nativescript-community\/ui-material-bottomsheet@7.2.72<\/li>\n<li>@nativescript-community\/ui-material-core@7.2.76<\/li>\n<li>@nativescript-community\/ui-material-core-tabs@7.2.76<\/li>\n<li>ngx-color@10.0.2<\/li>\n<li>ngx-toastr@19.0.2<\/li>\n<li>ngx-trend@8.0.1<\/li>\n<li>react-complaint-image@0.0.35<\/li>\n<li>react-jsonschema-form-conditionals@0.3.21<\/li>\n<li>react-jsonschema-form-extras@1.0.4<\/li>\n<li>rxnt-authentication@0.0.6<\/li>\n<li>rxnt-healthchecks-nestjs@1.0.5<\/li>\n<li>rxnt-kue@1.0.7<\/li>\n<li>swc-plugin-component-annotate@1.9.2<\/li>\n<li>ts-gaussian@3.0.6<\/li>\n<\/ul>\n<p>The malicious JavaScript code (&#8220;bundle.js&#8221;) injected into every of the trojanized package deal is designed to obtain and run TruffleHog, a reputable secret scanning device, utilizing it to scan the host for tokens and cloud credentials, corresponding to GITHUB_TOKEN, NPM_TOKEN, AWS_ACCESS_KEY_ID, and AWS_SECRET_ACCESS_KEY.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" name=\"more\"\/><\/p>\n<p>&#8220;It validates npm tokens with the whoami endpoint, and it interacts with GitHub APIs when a token is accessible,&#8221; Socket stated. &#8220;It additionally makes an attempt cloud metadata discovery that may leak short-lived credentials inside cloud construct brokers.&#8221;<\/p>\n<p>The script then abuses the developer&#8217;s credentials (i.e., the GitHub private entry tokens) to create a GitHub Actions workflow in .github\/workflows, and exfiltrates the collected knowledge to a webhook[.]website endpoint.<\/p>\n<p>Builders are suggested to audit their environments and rotate npm tokens and different uncovered secrets and techniques if the aforementioned packages are current with publishing credentials.<\/p>\n<p>&#8220;The workflow that it writes to repositories persists past the preliminary host,&#8221; the corporate famous. &#8220;As soon as dedicated, any future CI run can set off the exfiltration step from throughout the pipeline the place delicate secrets and techniques and artifacts can be found by design.&#8221;<\/p>\n<h3>crates.io Phishing Marketing campaign<\/h3>\n<p>The disclosure comes because the Rust Safety Response Working Group is warning of phishing emails from a typosquatted area, rustfoundation[.]dev, concentrating on crates.io customers.<\/p>\n<div class=\"dog_two clear\"><center class=\"cf\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/thehackernews.uk\/cis-security-suite\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"CIS Build Kits\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgkDdKZ4cf4syb2qVDyt76MS6-Iq2eLoi0woZ-R0yota4fauhbh-Ro40IHQaAcKWPGCf_BGWQSZd2VSdPJGkMefmls9YYuzVlgZ-mcdepOR1mlwFMTj2gqiGP5jHrt1VgmX72osdiB6x5DG-Tz1js5zJktU0pbKWFWqcqytxwSQZR9bRWMa9CBjiUDqomg\/s728-e100\/cis-d.png\" width=\"729\" height=\"91\"\/><\/a><\/center><\/div>\n<p>The messages, which originate from safety@rustfoundation[.]dev, warn recipients of an alleged compromise of the crates.io infrastructure and instruct them to click on on an embedded hyperlink to rotate their login data in order to &#8220;be sure that the attacker can not modify any packages revealed by you.&#8221;<\/p>\n<p>The rogue hyperlink, github.rustfoundation[.]dev, mimics a GitHub login web page, indicating a transparent try on the a part of the attackers to seize victims&#8217; credentials. The phishing web page is at the moment inaccessible.<\/p>\n<p>&#8220;These emails are malicious and are available from a site title not managed by the Rust Basis (nor the Rust Mission), seemingly with the aim of stealing your GitHub credentials,&#8221; the Rust Safety Response WG <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blog.rust-lang.org\/2025\/09\/12\/crates-io-phishing-campaign\/\" rel=\"noopener\" target=\"_blank\">stated<\/a>. &#8220;We now have no proof of a compromise of the crates.io infrastructure.&#8221;<\/p>\n<p>The Rust group additionally stated they&#8217;re taking steps to observe any suspicious exercise on crates.io, along with getting the phishing area taken down.<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>\ue802Sep 16, 2025\ue804Ravie LakshmananMalware \/ Cyber Assault Cybersecurity researchers have flagged a recent software program provide chain assault concentrating on the npm registry that has affected greater than 40 packages that belong to a number of maintainers. &#8220;The compromised variations embody a operate (NpmModule.updatePackage) that downloads a package deal tarball, modifies package deal.json, injects a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6712,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[717,5380,241,3425,483,1116,2987,1443,240],"class_list":["post-6710","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-attack","tag-bundle-js","tag-chain","tag-compromised","tag-credentials","tag-npm","tag-packages","tag-steal","tag-supply"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6710"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6710\/revisions"}],"predecessor-version":[{"id":6711,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6710\/revisions\/6711"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/6712"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-14 19:36:30 UTC -->