There are 36 harmful packages in the npm registry that cybersecurity experts have found This article explores harmful packages npm. . Each package has three files and looks like a mature Strapi v3 community plugin when you use version 3.6.8.
All of the packages that were found follow the same naming convention, which starts with "strapi-plugin-" Below is a list of how the payload has changed over the course of this campaign: To make a local Redis instance that can run code from a distance, add a crontab entry that downloads and runs a PHP web shell and a Node.js reverse shell script from an external server every minute. You can write shell payloads outside of the container by using Redis exploitation and escaping from a Docker container. Start a direct Python reverse shell on port 4444 and use Redis to add a trigger for a reverse shell to the node_modules directory of the app.
Run a credential harvester and reconnaissance payload to get environment dumps, extract Redis databases, map network topologies, get Docker/Kubernetes secrets, cryptographic keys, and cryptocurrency wallet files. This discovery fits with reports that say supply chain attacks on open-source software are becoming "the dominant force reshaping the global cyber threat landscape." Threat actors are using trusted vendors, open-source software, SaaS platforms, browser extensions, and managed service providers more and more to get into hundreds of other organizations.
"Package repositories like npm and PyPI are now prime targets for stolen maintainer credentials and automated malware worms to compromise widely used libraries," Group-IB said.
The report said that supply chain threats can quickly turn a small, localized breach into a large, cross-border incident. Attackers can do this by industrializing supply chain compromises and turning them into self-reinforcing ecosystems that offer reach, speed, and stealth. Group-IB put out the report, which is based on interviews with over 100 security experts and other experts from all over the world.
Visit www.group-IB.com for more.











.webp%3Fw%3D1068%26resize%3D1068%2C0%26ssl%3D1&w=3840&q=75)