• Services
    • Vulnerability Management
    • Pentest
    • Network Pentest
    • Website Security Check
    • Phishing Campaign
    • Mystery Guest
    • Quick scan
  • NetCaptain
  • Knowledge base
  • Partners
    • MSP
  • About us
    • Contact
    • Why CyberAnt
    • News
    • Vacancies
  • Login
  • EN
    • NL
  • Menu Menu

Tag Archive for: vulnerability management

Large-scale attack on popular npm packages: millions of websites and apps potentially affected

in News

Several widely used npm-packages (software building blocks) have been infected with malicious code. This happened after a successful phishing attack on one of the administrators of these building blocks. An npm-package is a building block that developers can use in their software so they don’t have to reprogram frequently used components every time. As a result, building blocks end up everywhere: in custom software as well as in standard products. Together, the infected components are downloaded and used more than 2 billion times a week by developers worldwide.

Phishing

The attackers gained access to the repository through a phishing email. The attack targeted Josh Junon (also known as Qix), a developer who is co-manager of several popular packages. Qix has the rights to add and approve new code, making his account sufficient to spread this malware.

Junon received a phishing email that looked very much like it came from npm itself, telling him to renew his two-step authentication (2FA) via a link before Sept. 10, 2025. When he followed this link, he was taken to a fake website where he entered his username, password and 2FA code. This data was immediately intercepted by criminals through a so-called Adversary-in-the-Middle attack, which allowed them to gain access to his account. With that access, the attackers were then able to publish infected versions of twenty popular packages in the official npm library.

On BlueSky , Junon responded, “Sorry everyone, I should have paid more attention. Not like me; have had a stressful week. Will work to get this cleaned up.”

Which packages are affected?

Among others, the following NPM packages contain temporarily malicious code:

  • chalk (widely used to display text in color in software tools)

  • debug (widely used for debugging)

  • ansi-regex, ansi-styles, wrap-ansi, strip-ansi (components that work with text formatting)

  • color-convert, color-string, color-name (for color management in software)

Together, these packages account for two billion downloads per week. Because they are often reused as building blocks in other packages, the infection was able to spread widely.

Especially risk for crypo providers

Analysis of the malware revealed that it was designed to steal cryptocurrency. The malicious code began by checking if it was running in a browser, then hooked into functions such as window.fetch, XMLHttpRequest and window.ethereum.request. These are components that websites use to exchange data and control crypto-wallets. This allowed the code to imperceptibly replace the recipient’s wallet address with that of the attacker during a payment, with the forged address resembling the original and therefore barely noticeable.

This type of attack comes under the heading of software supply chain attack. A supply chain attack involves attacking not the end user directly, but a link in the software supply chain. Similar attacks have been seen before, for example through typosquatting (offering a package with a nearly the same name as a popular package) or through slopsquatting (capitalizing on mistakes made by AI systems that recommend incorrect package names).

In this case, the malware specifically targets developers offering crypto-related services, so most software is unlikely to be affected even if it is infected.

https://cyberant.com/wp-content/uploads/2025/09/npm-2048-582778654.png 2048 2048 cyberant https://cyberant.com/wp-content/uploads/2020/08/logo-cyberant.svg cyberant2026-01-14 11:19:432026-01-14 11:19:43Large-scale attack on popular npm packages: millions of websites and apps potentially affected

NIS2 Guidelines: What companies need to know and how to comply

in Knowledge base, News, Risk management
Read more
https://cyberant.com/wp-content/uploads/2023/11/NIS2-Richtlijnen-cybersecurity.jpg 669 1000 John de Kroon https://cyberant.com/wp-content/uploads/2020/08/logo-cyberant.svg John de Kroon2023-11-03 12:38:202023-11-28 10:56:16NIS2 Guidelines: What companies need to know and how to comply

How secure is your network?

in News
Read more
https://cyberant.com/wp-content/uploads/2023/08/Cybersecurity-5.jpeg 851 1280 John de Kroon https://cyberant.com/wp-content/uploads/2020/08/logo-cyberant.svg John de Kroon2023-10-26 14:03:012023-11-09 11:23:10How secure is your network?

What is cross-site request forgery (CSRF)?

in Hacken, Knowledge base
Read more
https://cyberant.com/wp-content/uploads/2023/10/Cross-site-request-forgery-kennisbank-artikel.jpg 801 1180 cyberant https://cyberant.com/wp-content/uploads/2020/08/logo-cyberant.svg cyberant2023-10-12 16:06:372023-11-09 11:42:01What is cross-site request forgery (CSRF)?

Vulnerability Management protect your network from hackers

in News
Read more
https://cyberant.com/wp-content/uploads/2023/08/Cybersecurity-9.jpeg 855 1280 John de Kroon https://cyberant.com/wp-content/uploads/2020/08/logo-cyberant.svg John de Kroon2023-10-11 15:38:192023-11-09 10:37:17Vulnerability Management protect your network from hackers

Preventing a data breach

in News
Read more
https://cyberant.com/wp-content/uploads/2023/10/Voorkom-een-datalek.png 200 300 John de Kroon https://cyberant.com/wp-content/uploads/2020/08/logo-cyberant.svg John de Kroon2023-10-11 15:14:432023-11-09 10:26:01Preventing a data breach

Strengthen your corporate security with a thorough Network Security Check

in News, Not part of a category
Read more
https://cyberant.com/wp-content/uploads/2023/08/Cybersecurity-7.jpeg 854 1280 John de Kroon https://cyberant.com/wp-content/uploads/2020/08/logo-cyberant.svg John de Kroon2023-10-11 14:57:442023-11-09 10:32:58Strengthen your corporate security with a thorough Network Security Check

The Network Security Check

in Cyber Security, Knowledge base, Product information
Read more
https://cyberant.com/wp-content/uploads/2023/09/netwerk-security-check-cyberant.png 690 1035 cyberant https://cyberant.com/wp-content/uploads/2020/08/logo-cyberant.svg cyberant2023-09-27 09:40:222023-11-09 12:09:21The Network Security Check

What is web application scanning?

in Knowledge base, Product information, Risk management
Read more
https://cyberant.com/wp-content/uploads/2020/11/laptop-2838918_1920.jpg 1374 1920 John de Kroon https://cyberant.com/wp-content/uploads/2020/08/logo-cyberant.svg John de Kroon2022-09-26 15:23:392023-10-31 20:16:59What is web application scanning?

How does the CyberRisk work?

in Knowledge base, Product information, Risk management
Read more
https://cyberant.com/wp-content/uploads/2021/02/chart-down-4.png 802 1198 John de Kroon https://cyberant.com/wp-content/uploads/2020/08/logo-cyberant.svg John de Kroon2022-09-26 15:19:462023-04-12 15:45:14How does the CyberRisk work?
Page 1 of 212

Search

Search Search

Recent Posts

  • Once again malware found in US Code Extensions
  • Large-scale attack on popular npm packages: millions of websites and apps potentially affected
  • Age verification on the Internet: what about privacy?
  • Magecart attack claims 8.8 million victims worldwide
  • Help! I have been hacked

CyberAnt is ISO Certified

Iso gecertificeerd

Tags

.DS Store anti-virus award broken access control clickjacking Cryptographic Failures cyberaanval CyberAnt Cybercrime cybercriminelen CyberRisk Cyber Security Datalek Entity injection Etisch Hacker Hacker ict Insecure Design ISO 9001 ISO 27001 IT Infrastructuur beschermen malware Mass Assignment aanval NetCaptain NetCat shell upgraden Netgear ProSAFE switches nominated Open web application Security project Owasp path traversal penetration test pentest Ransomeware aanval Ransomware Responsible Disclosure Secure webshop Security Audit Security audits Security Misconfiguration Server-side request forgery (SSRF) Social Engineering SQL Injection start up of the year vulnerability management web applicatie scanning
CyberAnt is ISO gecertificeerd

Services

  • Pentest
  • Network Pentest
  • Website Security Check
  • Phishing Campaign
  • Mystery Guest

Cyberant

  • Why CyberAnt
  • Partners
  • Knowledge base
  • News
  • About us

Contact

Marconiweg 1
3899 BR Zeewolde

info@cyberant.com
+31 (0)85 047 1590

© Copyright - CyberAnt 2024
  • Link to Facebook
  • Link to LinkedIn
  • Link to Mail
Scroll to top Scroll to top Scroll to top

Deze site maakt gebruik van cookies. Door verder te surfen op de site gaat u akkoord met ons gebruik van cookies.

Accepteer instellingenVerberg de mededeling enkelInstellingen

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy statement
Accepteer instellingenVerberg de mededeling enkel