Malicious PyPI and npm Packages Exploit Supply Chain Dependencies
Summary
Hide ▲
Show ▼
Malicious packages in the Python Package Index (PyPI) and npm repositories have been discovered, exploiting dependencies to execute code and establish persistence. The PyPI packages termncolor and colorinal, downloaded 355 and 529 times respectively, use DLL side-loading to achieve remote code execution and steal system information. The npm packages redux-ace and rtk-logger, downloaded 163 and 394 times respectively, target developers to harvest sensitive data. Two additional npm packages, colortoolsv2 and mimelib2, were discovered using Ethereum smart contracts to conceal malicious commands and install downloader malware. These packages are part of a sophisticated campaign impacting both npm and GitHub, targeting cryptocurrency developers and users. The campaign involves a distribution-as-service (DaaS) offering called Stargazers Ghost Network, which artificially inflates repository popularity. The compromise of the eslint-config-prettier package highlights the risks in open-source ecosystems and automated dependency management.
Timeline
-
03.09.2025 22:59 1 articles · 26d ago
New npm packages colortoolsv2 and mimelib2 exploit Ethereum smart contracts
The packages colortoolsv2 and mimelib2 were uploaded in July 2025 and are no longer available for download. They use Ethereum smart contracts to conceal malicious commands and install downloader malware. The packages are part of a sophisticated campaign impacting both npm and GitHub, tricking developers into downloading and running them. The campaign targets cryptocurrency developers and users, using a network of GitHub repositories and a distribution-as-service (DaaS) offering called Stargazers Ghost Network.
Show sources
- Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers — thehackernews.com — 03.09.2025 22:59
-
18.08.2025 13:56 2 articles · 1mo ago
Malicious PyPI and npm Packages Exploit Dependencies in Supply Chain Attacks
Two additional npm packages, colortoolsv2 and mimelib2, were discovered using Ethereum smart contracts to conceal malicious commands and install downloader malware. These packages are part of a sophisticated campaign impacting both npm and GitHub, targeting cryptocurrency developers and users. The campaign involves a network of GitHub repositories and a distribution-as-service (DaaS) offering called Stargazers Ghost Network, which artificially inflates repository popularity. The packages fetch and run a next-stage payload from an attacker-controlled server upon being used or included in a project.
Show sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
- Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers — thehackernews.com — 03.09.2025 22:59
Information Snippets
-
termncolor and colorinal packages in PyPI were downloaded 355 and 529 times respectively.
First reported: 18.08.2025 13:561 source, 1 articleShow sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
-
The termncolor package imports colorinal, which loads a rogue DLL for decryption and payload execution.
First reported: 18.08.2025 13:561 source, 1 articleShow sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
-
The malware uses DLL side-loading to deploy a legitimate binary and a malicious DLL.
First reported: 18.08.2025 13:561 source, 1 articleShow sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
-
The malicious DLL harvests system information and communicates with a C2 server via Zulip.
First reported: 18.08.2025 13:561 source, 1 articleShow sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
-
Persistence is achieved through a registry entry under the Windows Run key.
First reported: 18.08.2025 13:561 source, 1 articleShow sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
-
The malware can also infect Linux systems by dropping a shared object file.
First reported: 18.08.2025 13:561 source, 1 articleShow sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
-
The threat actor has been active since July 10, 2025, with 90,692 messages exchanged on Zulip.
First reported: 18.08.2025 13:561 source, 1 articleShow sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
-
npm packages redux-ace and rtk-logger were downloaded 163 and 394 times respectively.
First reported: 18.08.2025 13:561 source, 2 articlesShow sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
- Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers — thehackernews.com — 03.09.2025 22:59
-
The npm packages target developers to harvest iCloud Keychain, web browser, and cryptocurrency wallet data.
First reported: 18.08.2025 13:561 source, 2 articlesShow sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
- Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers — thehackernews.com — 03.09.2025 22:59
-
The npm packages can download and run Python scripts, capture system information, and monitor clipboard content.
First reported: 18.08.2025 13:561 source, 1 articleShow sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
-
The eslint-config-prettier npm package was compromised via a phishing attack, affecting over 14,000 dependent packages.
First reported: 18.08.2025 13:561 source, 1 articleShow sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
-
Automated dependency management tools like Dependabot can introduce security risks if not properly scrutinized.
First reported: 18.08.2025 13:561 source, 2 articlesShow sources
- Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks — thehackernews.com — 18.08.2025 13:56
- Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers — thehackernews.com — 03.09.2025 22:59
-
Two new malicious npm packages, colortoolsv2 and mimelib2, were uploaded in July 2025 and are no longer available for download.
First reported: 03.09.2025 22:591 source, 1 articleShow sources
- Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers — thehackernews.com — 03.09.2025 22:59
-
The packages use Ethereum smart contracts to conceal malicious commands and install downloader malware.
First reported: 03.09.2025 22:591 source, 1 articleShow sources
- Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers — thehackernews.com — 03.09.2025 22:59
-
The packages are part of a sophisticated campaign impacting both npm and GitHub, tricking developers into downloading and running them.
First reported: 03.09.2025 22:591 source, 1 articleShow sources
- Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers — thehackernews.com — 03.09.2025 22:59
-
The packages are referenced in a network of GitHub repositories claiming to be trading bots, targeting cryptocurrency developers and users.
First reported: 03.09.2025 22:591 source, 1 articleShow sources
- Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers — thehackernews.com — 03.09.2025 22:59
-
The campaign involves a distribution-as-service (DaaS) offering called Stargazers Ghost Network, which artificially inflates repository popularity.
First reported: 03.09.2025 22:591 source, 1 articleShow sources
- Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers — thehackernews.com — 03.09.2025 22:59
-
The GitHub repositories pushing these packages include solana-trading-bot-v2, ethereum-mev-bot-v2, arbitrage-bot, and hyperliquid-trading-bot.
First reported: 03.09.2025 22:591 source, 1 articleShow sources
- Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers — thehackernews.com — 03.09.2025 22:59
-
The packages fetch and run a next-stage payload from an attacker-controlled server upon being used or included in a project.
First reported: 03.09.2025 22:591 source, 1 articleShow sources
- Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers — thehackernews.com — 03.09.2025 22:59
Similar Happenings
Malicious 'postmark-mcp' npm package exfiltrated user emails
An unofficial npm package named 'postmark-mcp' silently stole users' emails after a malicious update. The package, which mimicked the official 'postmark-mcp' project, added a line of code in version 1.0.16 to exfiltrate email communications to an external address. The malicious version was available for a week and recorded around 1,643 downloads, potentially exposing sensitive information. The package was used to interface AI assistants with the Postmark email delivery platform, allowing them to send emails on behalf of users or apps. The malicious functionality could have exposed personal communications, password reset requests, two-factor authentication codes, financial information, and customer details. Users who downloaded the package are advised to remove it immediately, rotate potentially exposed credentials, and audit all MCP servers in use. The malicious package was deleted by the developer 'phanpak' after being contacted, who maintains 31 other packages on npm.
Malicious npm package 'fezbox' uses QR codes to deliver cookie-stealing malware
A malicious npm package named 'fezbox' was discovered using QR codes to fetch and execute cookie-stealing malware. The package, disguised as a utility library, was downloaded at least 327 times before being removed from the npm registry. The malware targets user credentials and employs steganographic techniques to evade detection. The package was found to fetch a JPG image containing a QR code, which then executes a second-stage payload. The QR code is designed to be unusually dense and difficult to read with standard phone cameras, making it harder to detect. The package was published by a Chinese-speaking attacker using the alias 'janedu' and included multiple layers of obfuscation to evade detection. The malware specifically targets cookies to steal usernames and passwords, sending the stolen information via an HTTPS POST request to a command-and-control server. The package was removed and flagged as malware posing a supply-chain risk. The attacker's activity status on the npm registry remains unclear. The package's ReadMe mentioned a QR Code Module, making its existence seem legitimate. The package used reversed strings as an anti-analysis technique. The payload could read a web cookie and extract the username and password if both were present.
GitHub Strengthens npm Supply Chain Security with 2FA and Short-Lived Tokens
GitHub is implementing enhanced security measures to protect the npm ecosystem, including mandatory two-factor authentication (2FA) and short-lived tokens. These changes aim to mitigate supply chain attacks, such as the recent "s1ngularity", "GhostAction", and "Shai-Hulud" attacks, which involved a self-replicating worm and compromised thousands of accounts and private repositories. The measures include granular tokens with a seven-day expiration, trusted publishing using OpenID Connect (OIDC), and automatic generation of provenance attestations for packages. Additionally, GitHub is deprecating legacy tokens and TOTP 2FA, expanding trusted publishing options, and gradually rolling out these changes to minimize disruption. GitHub removed over 500 compromised packages and blocked new packages containing the Shai-Hulud malware's indicators of compromise. The company encourages NPM maintainers to use NPM-trusted publishing and strengthen publishing settings to require 2FA. Ruby Central is also tightening governance of the RubyGems package manager to improve supply-chain protections.
GPUGate Malware Campaign Targets IT Firms in Western Europe
A sophisticated malware campaign, codenamed GPUGate, targets IT and software development companies in Western Europe, with recent expansions to macOS users. The campaign leverages Google Ads, SEO poisoning, and fake GitHub commits to deliver malware, including the Atomic macOS Stealer (AMOS). The attack began in December 2024 and uses a 128 MB Microsoft Software Installer (MSI) to evade detection. The malware employs GPU-gated decryption and various techniques to avoid analysis and detection. The end goal is information theft and delivery of secondary payloads. The threat actors have native Russian language proficiency and use a cross-platform approach. The campaign has expanded to target macOS users through fake GitHub repositories. These repositories impersonate popular tools and use SEO poisoning to distribute the Atomic Stealer malware. The threat actors use multiple GitHub usernames to evade takedowns and deploy malware via Terminal commands. Similar tactics have been observed in previous campaigns using malicious Google Ads and public GitHub repositories. The AMOS malware now includes a backdoor component for persistent, stealthy access to compromised systems. The campaign impersonates over 100 software solutions, including 1Password, Dropbox, Confluence, Robinhood, Fidelity, Notion, Gemini, Audacity, Adobe After Effects, Thunderbird, and SentinelOne. The fake GitHub pages were created on September 16, 2025, and were immediately submitted for takedown. The campaign has been active since at least April 2023, with previous similar campaigns observed in July 2025.
Lazarus Group Deploys Multiple RATs in DeFi Sector Campaign
The Lazarus Group, a North Korea-linked threat actor, executed a social engineering campaign targeting a decentralized finance (DeFi) organization. The attack, observed in 2024, involved deploying three different cross-platform malware variants: PondRAT, ThemeForestRAT, and RemotePE. The campaign began with impersonation on Telegram and fake scheduling websites, leading to the compromise of an employee's system. The attackers used various tools for discovery, credential harvesting, and proxy connections, eventually transitioning to stealthier RATs. The attack chain started with the deployment of a loader called PerfhLoader, which dropped PondRAT. This malware, a stripped-down variant of POOLRAT, was used in combination with ThemeForestRAT for approximately three months before switching to the more sophisticated RemotePE. The impact of the attack includes the compromise of employee systems and potential data exfiltration. The use of multiple RATs indicates a sophisticated and multi-stage attack strategy aimed at high-value targets.