• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

JavaScript package manager npm removes malicious packages that were stealing data

{{postValue.id}}

JavaScript programming language package manager npm have disclosed and removed approximately 40 malware spiked packages that were designed to steal environment variables and the series of packages with names were similar to existing and popular npm packages.

The developers confirm the news that this is a case of typo squatting to distract inattentive users and they were slightly different than the usual package.

" Environmental variables are such common a way to hand credentials to software, it' s a pretty good thing to go after," said CJ Silverio, CTO at npm.

According to npm, a user by the handle name “ hacktask” published the malicious libraries on July 19 included the popular “ crossenv” as “ cross-env” and it has been downloaded 700 times before it was taken down. Fortunately only 50 users appear to be genuine installation while the rest seems to be registry mirrors.

" If you downloaded and installed any of these packages, you should immediately revoke and replace any credentials you might have had in your shell environment," npm advised.

Steps are taken to ensure to prevent further typo squatting problem by using the block publication option that detects spams as it is published to the registry.

Tags:
grayson
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 5 )

Q

How to detect the malicious?

A

“There are programmatic ways to detect this, and we might use them to block publication,” the npm blog post reads. “We’re using the Smyte service [a trust and safety SaaS offering] to detect spam as it is published to the registry, and will be experimenting with using it to detect other kinds of violations of our terms of service.”

Q

What should I do If it downloaded?

A

“If you downloaded and installed any of these packages, you should immediately revoke and replace any credentials you might have had in your shell environment,” npm advised.

Q

What is HackTack?

A

In response to the incident, npm banned the user “hacktask.” Additionally, npm said that its developers are discussing taking various approaches to detecting and preventing future instances of accidental or malicious typosquatting.

Q

Why the javascript has been attacked?

A

In a classic case of typosquatting intended to fool inattentive users, the fake packages featured names that were just slightly different than actual, genuine packages offered by npm. “The package naming was both deliberate and malicious – the intent was to collect useful data from tricked users,” npm explained in a blog post.

Q

It is possible to steals the data from ours?

A

Yes, Malicious always steals the files from the system.

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Isaac ?
How to run windows application in linux

I need to run the windows application in my Linux machine, instead of installing from yum repo or any other repos. How to do that..??

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.