Malicious npm Packages Leveraged as Phishing Infrastructure to Harvest Credentials

Related

Depthfirst Secures $40M to Advance AI-Driven Vulnerability Management

What happened Cybersecurity startup Depthfirst has raised $40 million in...

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Share

What happened

Security researchers have uncovered a coordinated campaign in which 27 malicious npm packages were uploaded to the npm registry and repurposed as phishing infrastructure to capture login credentials. These packages, published under six different publisher aliases, host browser‑served lures that imitate trusted services like document sharing and Microsoft sign‑in pages. When victims interact with these lures, they are redirected to attacker‑controlled login forms designed to harvest credentials. 

Who is affected

The activity has targeted employees, particularly sales and commercial personnel, at organizations in manufacturing, industrial automation, plastics, healthcare, and related sectors within the U.S. and allied countries. The malicious code did not require users to install the npm packages; instead, attackers used the npm CDN as a resilient platform for deploying phishing assets. 

Why CISOs should care

This campaign highlights how software development infrastructure and open source ecosystems can be abused beyond traditional supply‑chain tactics. Even non‑installed packages can serve as persistent delivery mechanisms for phishing content that defeats conventional security controls by leveraging trusted CDNs. The incident underscores the need for security teams to extend monitoring beyond code use to how package hosting services may be exploited as malicious hosting platforms. 

3 practical actions:

  1. Monitor npm CDN traffic: Inspect and block requests to known malicious npm CDN endpoints and domains hosting phishing content to reduce exposure to attacker infrastructure.
  2. Strengthen phishing defenses: Integrate URL inspection and content analysis for links served from development ecosystems, including npm, to catch hidden phishing attempts.
  3. Employee awareness training: Educate staff on identifying atypical sign‑in pages and social engineering lures, particularly those mimicking internal or trusted third-party tools.