Welcome to VelSicuro.com | Cybersecurity Solutions

NPM Flooded with Malicious Packages: 86,000 Open Source Malware Downloads Uncovered
By VELSICURO
03 November 2025
11 views
News

NPM Flooded with Malicious Packages: 86,000 Open Source Malware Downloads Uncovered

The world's most popular JavaScript package repository, NPM, is once again facing a severe supply chain security crisis. A new security report reveals a large-scale malware campaign where hundreds of malicious packages were successfully uploaded to the platform.

According to the report highlighted by Ars Technica, these malicious packages were collectively downloaded over 86,000 times by unsuspecting developers before they were finally detected and removed.

This incident once again underscores the extreme vulnerability of the modern open-source ecosystem, where developers often rely on hundreds of third-party packages to build their applications.

 

Modus Operandi: Credential Theft

 

Unlike typical typosquatting attacks (mimicking popular package names), this campaign was far more sophisticated. The attackers used techniques specifically designed to steal credentials from developer environments.

The malware was reportedly disguised as seemingly harmless tools or utilities. However, once installed on a developer's machine, the malware would:

  1. Scan the system for files containing sensitive credentials.

  2. Search for environment variables storing API keys, access tokens, or database passwords.

  3. Exfiltrate (steal and send) this sensitive data to an attacker-controlled server.

This stolen data can then be used to infiltrate deeper into corporate infrastructure, steal source code, or hijack cloud accounts (like AWS or Google Cloud).

 

The Open-Source Ecosystem at Risk

 

Repositories like NPM, PyPI (Python), and RubyGems are the backbone of modern software development. However, their open nature also makes them a prime target.

Security experts warn that software supply chain attacks are now one of the fastest-growing threat vectors. Hackers realize that by compromising a single malicious package, they can potentially compromise thousands of applications and companies that depend on it.

The NPM security team has since removed the malicious packages. However, with 86,000 downloads having already occurred, the damage may already be widespread. Developers and companies using NPM are urged to immediately audit their project dependencies and scan their systems for any signs of credential theft.

Need Any Technology Solution

Let’s Work Together on Project

GET STARTED
velsicuro.com