New npm Supply Chain Worm Harvests Crypto Keys, Dev Credentials, and CI Secrets

Related

Share

What happened

Security researchers have uncovered an active supply chain attack involving at least 19 malicious npm packages that embed a worm‑like payload designed to harvest sensitive data, including cryptocurrency keys, development environment credentials, Continuous Integration (CI) secrets, and API tokens, and automatically propagate across developer environments and repositories. 

Who is affected

The campaign, tracked as SANDWORM_MODE, targets the npm ecosystem and developer toolchains, affecting any organization or developer that installs compromised packages or uses them in CI/CD workflows. The payload also targets common developer tools such as VS Code and multiple AI model API keys, meaning both individual developers and enterprise development environments are at risk.

Why CISOs should care

This incident underscores the growing sophistication of software supply chain attacks that not only steal credentials and keys but also can self‑propagate. Compromised developer dependencies can lead to stolen access tokens, breached build pipelines, compromised cloud environments, and unauthorized access to production systems, potentially enabling broader infiltration of enterprise infrastructure.

3 practical actions

  1. Audit and remove compromised packages: Identify and uninstall the affected npm packages immediately, then rotate exposed credentials such as npm/GitHub tokens, API keys, and CI secrets.
  2. Strengthen supply chain defenses: Implement dependency verification, signed packages, and automated scanning tools in CI/CD pipelines to detect malicious or unexpected changes in package.json and lockfiles.
  3. Enforce least privilege and segmentation: Restrict the permissions of tokens and service accounts used in development and CI/CD workflows, and regularly review access scopes to limit the impact of credential theft.