Malicious npm Packages Leveraged as Phishing Infrastructure to Harvest Credentials

Related

CISOs to Watch in Virginia’s Hospitals & Healthcare Industry

Virginia's healthcare sector encompasses major hospital systems, academic medical...

CISOs to Watch in Virginia’s Information Technology Industry

Virginia's information technology sector spans managed services, cloud platforms,...

Fake LastPass Support Email Threads Attempt to Steal Vault Master Passwords

What happened A phishing campaign targeting LastPass users uses fake...

CISOs to Watch in Maryland’s Information Technology Industry

Maryland’s information technology sector includes consulting firms, cybersecurity providers,...

CISOs to Watch in Maryland’s Government Administration

Government agencies manage vast amounts of sensitive information and...

Share

What happened

Security researchers have uncovered a coordinated campaign in which 27 malicious npm packages were uploaded to the npm registry and repurposed as phishing infrastructure to capture login credentials. These packages, published under six different publisher aliases, host browser‑served lures that imitate trusted services like document sharing and Microsoft sign‑in pages. When victims interact with these lures, they are redirected to attacker‑controlled login forms designed to harvest credentials. 

Who is affected

The activity has targeted employees, particularly sales and commercial personnel, at organizations in manufacturing, industrial automation, plastics, healthcare, and related sectors within the U.S. and allied countries. The malicious code did not require users to install the npm packages; instead, attackers used the npm CDN as a resilient platform for deploying phishing assets. 

Why CISOs should care

This campaign highlights how software development infrastructure and open source ecosystems can be abused beyond traditional supply‑chain tactics. Even non‑installed packages can serve as persistent delivery mechanisms for phishing content that defeats conventional security controls by leveraging trusted CDNs. The incident underscores the need for security teams to extend monitoring beyond code use to how package hosting services may be exploited as malicious hosting platforms. 

3 practical actions:

  1. Monitor npm CDN traffic: Inspect and block requests to known malicious npm CDN endpoints and domains hosting phishing content to reduce exposure to attacker infrastructure.
  2. Strengthen phishing defenses: Integrate URL inspection and content analysis for links served from development ecosystems, including npm, to catch hidden phishing attempts.
  3. Employee awareness training: Educate staff on identifying atypical sign‑in pages and social engineering lures, particularly those mimicking internal or trusted third-party tools.