malicious packages

Tech Optimizer
October 29, 2025
Security researchers from Socket have discovered ten malicious npm packages that infiltrated the Node Package Manager ecosystem, mimicking legitimate tools and downloaded nearly 10,000 times. These typosquatted packages contain malware that bypasses application-level security to target system keyrings, allowing the harvesting of decrypted credentials and access to critical resources like corporate emails and databases. Users who installed these packages are advised to treat their systems as compromised, disconnect from the internet, revoke exposed credentials, wipe and rebuild the infected system, change passwords, audit npm dependencies, review logs for suspicious activity, and enable multi-factor authentication.
Tech Optimizer
June 3, 2025
Cybersecurity experts have highlighted the risks of typosquatting, where developers accidentally download malicious packages due to typographical errors. A report from Checkmarx reveals that attackers exploit this trust by creating counterfeit packages that can grant unauthorized access to systems. Malicious packages have been found in the Python Package Index (PyPI) and can enable remote control, posing serious threats to system integrity. Attackers employ a cross-platform strategy, mixing names from different programming environments to target unsuspecting users. On Windows, malware can create scheduled tasks and disable antivirus protections, while on Linux, certain packages facilitate encrypted reverse shells for data exfiltration. Although the malicious packages have been removed, the threat remains, prompting developers to verify package sources and spellings. Checkmarx recommends organizations conduct audits of deployed packages and scrutinize application code to enhance security.
Winsage
August 6, 2024
GuardDog software identified two malicious npm packages, harthat-hash and harthat-api, linked to a North Korean threat actor group called "Stressed Pungsan," which has connections to Microsoft's MOONSTONE SLEET. These packages were uploaded by a user named nagasiren978 on July 7, 2024, and were designed to download additional malware from a suspected North Korean command and control server. The packages utilized a pre-install script to download and execute a harmful DLL via rundll32, while also self-destructing to evade detection. The harthat-api package impersonated the legitimate Hardhat package and modified its package.json file to conceal its malicious intent. The malicious DLL appeared innocuous but is suspected to contain harmful functionality. The threat actors compromised targets using the packages harthat-api-v1.3.1.zip and harthat-hash-v1.3.3.zip, traced back to the IP address 142.111.77.196. Indicators of compromise include the filename Temp.b (package.db) and its SHA256 hash, d2a74db6b9c900ad29a81432af72eee8ed4e22bf61055e7e8f7a5f1a33778277.
Search