Top npm package backdoored to drop dirty RAT on dev machines
Briefly

Top npm package backdoored to drop dirty RAT on dev machines
"The attackers swapped the account's email address for an anonymous ProtonMail inbox and pushed the infected packages manually via the npm CLI, completely bypassing the project's GitHub Actions CI/CD pipeline and the safeguards developers tend to assume are in place."
"The added package, plain-crypto-js@4.2.1, existed purely as a delivery mechanism. Its post-install script phones home, fetches a second-stage payload, and sets about dropping malware tailored to whatever it finds."
The npm library axios was compromised when attackers hijacked a maintainer's account, injecting a remote-access trojan into two releases. The malicious versions, axios@1.14.1 and axios@0.30.4, were published before being removed, affecting developers and CI pipelines. The attackers bypassed standard security measures by using a compromised account to publish the infected packages directly. The added dependency, plain-crypto-js@4.2.1, served as a delivery mechanism for malware, which operated differently across operating systems to avoid detection.
Read at Theregister
Unable to calculate read time
[
|
]