Widely-used npm linter packages compromised through phishing to deliver malware

Widely-used npm linter packages compromised through phishing to deliver malware

NPM Libraries Compromised in Supply Chain Attack

This week, several popular JavaScript libraries, including eslint-config-prettier, were hijacked and turned into malware droppers due to a supply chain attack initiated through phishing. The maintainer fell victim to a scam that allowed attackers to publish malicious versions of these widely-used packages.

Key Details

  • Who: Maintainer JounQin of eslint-config-prettier and related libraries.
  • What: Compromised versions of key packages (eslint-config-prettier, eslint-plugin-prettier, synckit, @pkgr/core, and napi-postinstall) included a malicious post-install script designed to execute malware on Windows.
  • When: The attack was detected on July 18, 2025.
  • Where: Affected packages are hosted on the NPM registry, widely used in Node.js projects.
  • Why: Attackers exploited stolen credentials obtained through a phishing email, published unauthorized versions containing malware.
  • How: The malicious script was configured to run automatically upon installation, executing a trojan DLL file.

Why It Matters

This incident underscores significant risks in modern software development, particularly in areas such as:

  • Enterprise Security: Increased threats to supply chain integrity necessitate stricter security protocols for package maintainers.
  • Compliance: Organizations must ensure compliance with security standards to protect their infrastructure.
  • Cloud Adoption: Developers should reassess the trust placed in third-party libraries within cloud-based environments.

Takeaway for IT Teams

IT professionals should immediately review their package-lock files for the affected versions, especially if any builds were deployed after July 18th. Ensuring the security of your supply chain is vital to prevent similar incidents in the future. Rotate any credentials that may have been exposed and consider implementing a more robust security training program to raise awareness about phishing threats.

For ongoing updates and insights into software vulnerabilities and IT infrastructure trends, visit TrendInfra.com.

Meena Kande

meenakande

Hey there! I’m a proud mom to a wonderful son, a coffee enthusiast ☕, and a cheerful techie who loves turning complex ideas into practical solutions. With 14 years in IT infrastructure, I specialize in VMware, Veeam, Cohesity, NetApp, VAST Data, Dell EMC, Linux, and Windows. I’m also passionate about automation using Ansible, Bash, and PowerShell. At Trendinfra, I write about the infrastructure behind AI — exploring what it really takes to support modern AI use cases. I believe in keeping things simple, useful, and just a little fun along the way

Leave a Reply

Your email address will not be published. Required fields are marked *