Manager (npm), the world’s largest software registry, containing over 800,000
package, identified as 1337qq-js, was
spotted stealing sensitive data through install scrips of Unix Systems. It
marks the sixth-known incident to strike the npm repository in the past three
to the analysis by the npm team, only Unix Systems are targeted, and the data
it collects includes running processes, environment variables, uname
–a, npmrc file and /etc/hosts.
how can this malicious package affect its users? Well, some sensitive
information such as hard-coded passwords and API access tokens are sometimes
years, similar security breaches have made it on the npm repository index. Most
notably, in April 2017, npm was hit with the upload of 38 malicious libraries configured to steal environment details from projects
that used them.
the malicious package was successfully removed from the npm website after a
two-week shelf life.
npm repository for 1337qq-js now
reads: “This package name is not currently in use, but was formerly occupied by
another package. To avoid malicious use, npm is hanging on to the package name,
but loosely, and we’ll probably give it to you if you want it.”
package are urged to remove it from their systems and reset any compromised
passwords or credentials.
*** This is a Security Bloggers Network syndicated blog from HOTforSecurity authored by Alina Bizga. Read the original post at: https://hotforsecurity.bitdefender.com/blog/malicious-npm-package-exfiltrating-data-from-unix-systems-22041.html