News: 0179090382

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Hackers Hijack npm Packages With 2 Billion Weekly Downloads in Supply Chain Attack (bleepingcomputer.com)

(Monday September 08, 2025 @05:50PM (msmash) from the PSA dept.)


An anonymous reader shares a report:

> In what is being called the largest supply chain attack in history, attackers have [1]injected malware into NPM packages with over 2.6 billion weekly downloads after compromising a maintainer's account in a phishing attack.

>

> The package maintainer whose accounts were hijacked in this supply-chain attack confirmed the incident earlier today, stating that he was aware of the compromise and adding that the phishing email came from support [at] npmjs [dot] help, a domain that hosts a website impersonating the legitimate npmjs.com domain.

>

> In the emails, the attackers threatened that the targeted maintainers' accounts would be locked on September 10th, 2025, as a scare tactic to get them to click on the link redirecting them to the phishing sites.



[1] https://www.bleepingcomputer.com/news/security/hackers-hijack-npm-packages-with-2-billion-weekly-downloads-in-supply-chain-attack/



The package maintainer? (Score:2)

by oldgraybeard ( 2939809 )

"phishing email" really! I have never taken the npm plunge because of the history.

Re: (Score:3)

by gweihir ( 88907 )

Seems the whole JavaScript ecosystem is mediocre and worse (with apologies to the people that are the rare exceptions that can be found anywhere).

You ARE the weakest link (Score:4, Informative)

by umopapisdn69 ( 6522384 )

Sheesh. Anti-Phishing training is so hard to do effectively. The inherent asymmetry of the conflict is crushing. Attackers only have to succeed once. Defenders must succeed every time.

Re: (Score:3)

by gweihir ( 88907 )

It has always been an asymmetric fight. And that is not going to change. With LLMs now writing apparently quite reasonable malware (for malware it does not matter if it is insecure or you have to write 20 different versions before one works), the conflict is going to get even more asymmetrical and the pressure on crapware makers will increase.

This attack is one reason, professional admin work uses dedicated machines and sign-offs by a 2nd admin for everything. Amateur-level procedures have really run their

Re: (Score:2)

by Bert64 ( 520050 )

So long as companies continue to send out suspicious looking emails they will be conditioning users to fall for the phishing.

I've lost track of the number of legit companies that sent me mails which looked like phishing - instructions to click links, enter passwords etc. They act all indignant when you report the suspicious emails as phishing.

And another problem is not using the infrastructure that already exists - S/MIME has been around for years, supported OOTB by outlook, android mail app, apple mail app

Re: (Score:2)

by Bert64 ( 520050 )

And don't even get me started on the "secure messaging" applications a lot of companies use... Instead of emailing you the content/file directly, it sends you a link to sign up to some "secure email" site, from which you can download the actual content.

1) the notification looks like a phishing attempt because it invites you to click a link and login/register somewhere

2) the purpose of the system is to not send the content over unencrypted email, however since you register to the system (and reset your passw

Re: (Score:2)

by test321 ( 8891681 )

I manage my own domain and create aliases for each online account I create. Two years ago, an airline I used to fly with got hacked and my e-mail with the template $AIRLINE.customer.$RANDOM@mydomain.com started getting spam. I deleted this alias and created a new account, but I also created a catchall on the domain then forgot about it.

Last week I opened the catchall inbox. I found a series of very well designed phishing emails. It's something like "tribunal of $MY_DISTRICT has pending process 123ZYX654, wi

Re: (Score:2)

by ffkom ( 3519199 )

If you keep a local copy somebody might think you are responsible of not having it contain malware. So according to the laws of organized irresponsibility, you better not cache anything, so you can point to that random guy on the Internet and shout "It was not me, it was his fault our software got infected!".

The penalties for phishing need to be bigger... (Score:2)

by MikeDataLink ( 536925 )

Drop a nuke on their house...

Re: (Score:3)

by gweihir ( 88907 )

Stupid comment is stupid. If you know who does it, you can either simply have then arrested or any attack would start WW3.

Single-person dependencies are not good (Score:5, Insightful)

by gweihir ( 88907 )

At the very least anything that goes into production should have a 2nd person review and sign-off on it. That tends to curb this kind of thing. On the other hand, maybe NPM is just a toy collection without quality, security and reliability? Given that it is JavaScript, that seems likely.

Re: (Score:3)

by Bert64 ( 520050 )

Look how many "security tools" invite you to download an arbitrary script with curl, and then pipe it to a shell running as root, for example:

[1]https://github.com/pry0cc/axio... [github.com]

And then what does that script do? Follow best practices for installing software on the target platforms?

Nooo..

It does ridiculous things like blindly overwrite files in /usr/bin with things it's pulled from another site:

sudo wget -q -O /usr/bin/jq [2]https://github.com/stedolan/jq.. [github.com]

[1] https://github.com/pry0cc/axiom

[2] https://github.com/stedolan/jq/releases/download/jq-1.6/jq-linux64

Too much of the internet is auto updated (Score:2)

by xack ( 5304745 )

At least when a cd rom was infected they could be recalled and replaced. I just know that Windows update will get hacked one day and have 1 billion computers ransomwared. It will probably be an AI hallucination from a dev team overworked from layoffs.

Re: (Score:2)

by slipped_bit ( 2842229 )

That basically happened. It was called Windows 11.

Brief History Of Linux (#27)

Microsoft's position as the 5,000 pound gorilla of the computer industry
didn't change during the 1990's. Indeed, this gorilla got even more
bloated with every passing Windows release. Bill Gates' business strategy
was simple:

1. Pre-announce vaporous product.
2. Hire monkeys (low-paid temps) to cruft something together in VB
3. It it compiles, ship it.
4. Launch marketing campaign for new product showcasing MS "innovation".
5. Repeat (GOTO 1).

With such a plan Microsoft couldn't fail. That is, unless some external
force popped up and ruined everything. Such as Linux and the Internet
perhaps. Both of these developments were well-known to Bill Gates in the
early and mid 1990's (a company as large as Microsoft can afford a decent
spy network, after all). He just considered both to be mere fads that
would go away when Microsoft announced some new innovation, like PDAs --
Personal Desktop Agents (i.e. Bob and Clippit).