Threat Feed
Maintainer account hijacked. Drops a cross-platform RAT via hidden plain-crypto-js dependency that steals SSH keys, cloud tokens, and credentials
Safe version: 1.14.0
Same hijacked account. Identical RAT dropper targeting the legacy 0.x branch. Steals SSH keys and cloud credentials
Safe version: 0.30.3
Purpose-built RAT dropper staged for the axios attack. Postinstall script delivers OS-specific payloads that steal credentials and phone home to C2
CanisterWorm attack. Steals npm auth tokens and launches background process to propagate the worm to all accessible packages
Safe version: 1.8.10
Typosquat targeting Claude Code users. Self-replicating worm that steals tokens, modifies projects to include itself, and injects rogue MCP servers into AI coding tools
Another Claude Code typosquat. Same MCP-injection worm that instructs AI assistants to exfiltrate SSH keys and AWS credentials
Typosquat of rimraf. Part of 19-package SANDWORM_MODE campaign stealing credentials and propagating via stolen npm tokens
Typosquat of Hardhat (Ethereum dev framework). Same self-replicating credential theft worm
Shai-Hulud self-replicating worm. Runs TruffleHog to scan for secrets, steals npm/GitHub/AWS tokens, injects rogue GitHub Actions to spread
Safe version: 4.1.0
Second Shai-Hulud worm release. Same credential-stealing and self-propagating payload
Safe version: 4.1.0
Shai-Hulud worm victim. Postinstall steals secrets via TruffleHog and propagates to other packages
Safe version: 18.1.3
Later Shai-Hulud release across the 20.x branch. Same credential exfiltration and worm propagation
Safe version: 20.0.2
Shai-Hulud worm. Steals npm tokens, GitHub PATs, and cloud credentials, then spreads to more packages
Safe version: 9.0.0
Shai-Hulud worm victim. Exfiltrates GITHUB_TOKEN, NPM_TOKEN, AWS_ACCESS_KEY_ID to attacker webhooks
Safe version: 14.1.0
Shai-Hulud worm propagation. Malicious preinstall scripts scan for and exfiltrate secrets
Safe version: 19.0.0
S1ngularity attack via GitHub Actions injection. Deploys QUIETVAULT stealer that harvests tokens, keys, and secrets
Safe version: 21.4.0
S1ngularity attack targeting legacy branch. Same QUIETVAULT stealer. Attacker gained full AWS admin access at a victim org within 72 hours
Safe version: 20.8.0
Deprecated package hijacked. RAT establishes C2 connection for shell commands, file upload, and recon. Persists after downgrading
Safe version: 2.0.82
Same hijack, 1.x branch. Same RAT payload. Full system scan required — downgrading does not remove the RAT
Safe version: 1.0.109
Typosquat of ethers ecosystem. Patches the legitimate ethers package with a reverse shell backdoor. Uninstalling does NOT remove the backdoor
Companion typosquat targeting ethers. Same reverse shell injection into the legitimate ethers library
Published via stolen npm tokens. Hides XMRig Monero miner in support.js
Safe version: 1.1.6
Companion to rspack/core compromise. Same stolen token, same XMRig miner payload
Safe version: 1.1.6
Stolen npm tokens. XMRig miner hidden as /tmp/vant_helper. Multiple versions affected across three major branches
Safe version: 4.9.10
Earlier compromised version in the vant cryptominer campaign
Safe version: 4.9.10
Account compromised via phishing. Exfiltrates Solana private keys through fake CloudFlare headers. $184K in crypto stolen
Safe version: 1.95.5
Second compromised version from same account takeover. Same private key exfiltration backdoor
Safe version: 1.95.5
Legitimate package turned malicious. Harvests SSH keys, bash history, and env vars every 12 hours. Deploys XMRig miner via systemd. Active for over a year
Safe version: 1.3.3
Typosquat of node-hide-console-window. Downloads Discord bot that installs r77 rootkit for persistent stealthy access
Account phished. Injected crypto wallet drainer popup. At least one victim lost $723K in Bitcoin
Safe version: 2.0.4
Second malicious version from same phishing attack. Same wallet drainer. CDN users auto-served compromised release
Safe version: 2.0.4
Third malicious version. Three compromised releases within one hour. Upgrade to 2.0.8
Safe version: 2.0.4
Maintainer sabotage. Infinite loop printing LIBERTY and Zalgo text, breaking all 19,000+ dependent applications
Safe version: 1.4.0
Additional sabotage release. Same infinite loop payload
Safe version: 1.4.0
Maintainer sabotage. All code gutted and replaced with empty shell. Use @faker-js/faker as the community fork replacement
Safe version: 5.5.3
Account compromised. Postinstall downloads OS-specific payloads that steal browser passwords, credit cards, screenshots, and keystrokes
Safe version: 2.0.2
Same attacker as coa hijack. Identical password-stealing malware. Package has 14M weekly downloads
Safe version: 1.2.8
Account hijacked. Injects XMRig Monero miner on Linux and credential-stealing trojan on Windows that harvests passwords from browsers and email clients
Safe version: 0.7.28
Same hijack. Identical cryptominer and credential stealer published to unused version range
Third malicious version from same hijack. Same payload across three version ranges to maximize blast radius
Attacker gained maintainer access via social engineering. Added flatmap-stream with encrypted payload targeting Bitpay Copay Bitcoin wallet
Safe version: 3.3.5
Purpose-built payload for the event-stream attack. Uses Copay app description as AES256 decryption key to activate Bitcoin wallet theft