Hackers are abusing the Node Bundle Supervisor (NPM) registry — a database of JavaScript packages — to focus on multi-language builders with typo-squatted packages containing stealers and distant code execution (RCE) codes.
In line with a analysis by cybersecurity agency Socket, a coordinated malware marketing campaign, with proof of origin in China, has revealed dozens of malicious packages that mimic well-known Python, Java, C++, .NET, and Node.js libraries.
“This tactic could particularly goal builders acquainted with a number of programming languages, tricking them into putting in malicious packages as a consequence of familiar-sounding bundle names, which seem unexpectedly within the npm registry as an alternative of their unique ecosystem,” stated Socket researchers in a weblog put up.
The booby-trapped packages used within the marketing campaign pack obfuscated code, designed to slide previous security defences, run malicious scripts to siphon off delicate knowledge, and set up persistence on affected programs.



