Skip to main content
Mallory
Mallory

npm Supply-Chain Attacks Steal Developer Tokens and Enable Cloud Compromise

token theftgithub tokensmalicious packagescredential theftgithub actionsnpmpackage.jsondata exfiltrationsupply chainremote dynamic dependenciessecrets exfiltrationdestructive actionsexternal url dependenciesjavascriptpull_request_target
Updated March 11, 2026 at 07:11 PM2 sources
npm Supply-Chain Attacks Steal Developer Tokens and Enable Cloud Compromise

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Threat actors are using malicious npm packages to steal developer credentials and CI/CD secrets, enabling rapid escalation into cloud environments. Google reported that UNC6426 leveraged keys stolen during the earlier compromise of the nx npm ecosystem to pivot from a stolen developer GitHub token into AWS administrative access within 72 hours, abusing GitHub-to-AWS OpenID Connect (OIDC) trust to create a new admin role. The actor then used that access to exfiltrate data from AWS S3 and conduct destructive actions in production cloud environments; the initial nx compromise involved a GitHub Actions pull_request_target workflow abuse (“Pwn Request”) that enabled publishing trojanized packages containing a postinstall chain that executed the QUIETVAULT JavaScript credential stealer and uploaded stolen data to a public GitHub repo (/s1ngularity-repository-1).

Separately, researchers reported new waves of the PhantomRaven npm supply-chain campaign distributing 88 additional malicious packages (via ~50 disposable accounts) that target JavaScript developers by exfiltrating secrets from files like .gitconfig and .npmrc, environment variables, and CI/CD tokens (e.g., GitHub/GitLab/Jenkins/CircleCI). The campaign uses slopsquatting (LLM-suggested lookalike package names) and a stealth technique called Remote Dynamic Dependencies (RDD), where package.json pulls a dependency from an external URL so the malicious payload is fetched at install time (npm install) and can evade static package inspection; researchers indicated many of these packages remained available in the npm registry at the time of reporting.

Related Entities

Threat Actors

Malware

Affected Products

Related Stories

PhantomRaven Campaign Uses 88 Malicious npm Packages to Steal Developer Secrets

PhantomRaven Campaign Uses 88 Malicious npm Packages to Steal Developer Secrets

Researchers reported a renewed **PhantomRaven** software supply chain campaign on the npm registry involving **88 malicious packages** masquerading as trusted JavaScript ecosystem projects, including packages themed around *Babel* and *GraphQL Codegen*. The packages were published across three waves from late 2025 into early 2026 and were designed to automatically fetch and run malware after installation, targeting developers and build environments rather than end users. The activity is not fluff: it is a substantive threat intelligence and malware distribution story involving active credential theft through open-source package abuse. The malware exfiltrates sensitive data from developer systems and CI/CD environments, including emails and configuration data from `.npmrc`, `.gitconfig`, and environment variables, as well as tokens for **GitHub**, **GitLab**, **CircleCI**, and **Jenkins**. Reporting indicates PhantomRaven has kept core infrastructure and payload behavior broadly consistent since earlier activity, while adapting operational details by rotating npm and email accounts, changing package metadata and PHP endpoints, and increasing the pace of malicious package publication. Most of the packages were reportedly still available for download at the time of reporting, underscoring continued exposure for organizations that rely on npm-based development workflows.

4 days ago

Malicious npm Packages Stealing Developer Credentials Across Platforms

Security researchers have uncovered multiple campaigns involving malicious npm packages designed to steal developer credentials and sensitive information from Windows, macOS, and Linux systems. In one operation, ten typosquatted packages impersonated popular libraries such as TypeScript, discord.js, ethers.js, and others, using sophisticated obfuscation, fake CAPTCHA prompts, and postinstall hooks to deploy an information stealer that harvested credentials from system keyrings, browsers, and authentication services. The malware executed in a new terminal window to evade detection and sent stolen data, including IP addresses, to external servers. Another large-scale campaign, dubbed 'PhantomRaven,' involved 126 npm packages and over 86,000 downloads, targeting authentication tokens, CI/CD secrets, and GitHub credentials. These packages leveraged remote dynamic dependencies to fetch and execute payloads during installation, profiling infected devices and exfiltrating secrets for potential supply chain attacks. The attackers employed techniques such as slopsquatting, where AI-generated package recommendations led developers to install non-existent, malicious packages. Some packages impersonated tools from GitLab and Apache, and many remained available on npm at the time of reporting. The campaigns highlight the ongoing risks in the npm ecosystem, with attackers exploiting both user trust and platform weaknesses to compromise developer environments and CI/CD pipelines. Security experts warn that the theft of tokens and credentials could enable further attacks, including the introduction of malicious code into legitimate projects and broader supply chain compromises.

4 months ago
Software Supply Chain Threats Targeting Open-Source Ecosystems and Developer Tooling

Software Supply Chain Threats Targeting Open-Source Ecosystems and Developer Tooling

Open-source software supply chain risk continued to escalate, with reporting citing **454,600+** newly identified malicious packages across major repositories (including **PyPI, npm, Maven Central, NuGet, and Hugging Face**) and tactics ranging from **credential theft** to **multi-stage attacks** and even early **self-replicating** package malware. The activity reportedly concentrated heavily in **npm**, including high-volume “ecosystem flooding” (e.g., single accounts publishing **150,000+** malicious packages in days) and **hijacking of trusted projects**, exploiting developer reliance on superficial trust signals such as package names, READMEs, and download counts. Separately, researchers disclosed **“PackageGate”** vulnerabilities in JavaScript package managers (**npm, pnpm, vlt, and Bun**) that can bypass common post-incident defenses—namely `--ignore-scripts` and lockfile integrity—enabling malicious code execution via compromised dependencies. Koi Security reported six issues; **pnpm, vlt, and Bun** shipped fixes, while **npm** reportedly treated the behavior as expected. In parallel, threat actors abused **GitHub’s fork architecture** to distribute a spoofed *GitHub Desktop* installer promoted via search ads; execution deployed **HijackLoader** and established persistence via a **scheduled task**, underscoring that supply chain threats extend beyond package registries into developer tooling distribution channels.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.