Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Major iPhone update: iOS 26.3 makes switching to Android and third-party smartwatches easier

    “The world is in peril”: Anthropic’s head of AI safety resigns, unable to reconcile his work with his values

    Xiaomi 17 Ultra falls behind Apple iPhone 17 Pro in camera test

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      How Polymarket Is Turning Bitcoin Volatility Into a Five-Minute Betting Market

      February 13, 2026

      Israel Indicts Two Over Secret Bets on Military Operations via Polymarket

      February 13, 2026

      Binance’s October 10 Defense at Consensus Hong Kong Falls Flat

      February 13, 2026

      Argentina Congress Strips Workers’ Right to Choose Digital Wallet Deposits

      February 13, 2026

      Monero Price Breakdown Begins? Dip Buyers Now Fight XMR’s Drop to $135

      February 13, 2026
    • Technology

      Major iPhone update: iOS 26.3 makes switching to Android and third-party smartwatches easier

      February 13, 2026

      “The world is in peril”: Anthropic’s head of AI safety resigns, unable to reconcile his work with his values

      February 13, 2026

      Xiaomi 17 Ultra falls behind Apple iPhone 17 Pro in camera test

      February 13, 2026

      Haru Mini retro camera takes on Kodak Charmera with a 20MP sensor in tiny retro SLR body

      February 13, 2026

      Under $8: Fantasy-themed strategy RPG reaches new all-time low on Steam

      February 13, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Popular npm linter packages hijacked via phishing to drop malware
    Technology

    Popular npm linter packages hijacked via phishing to drop malware

    TechAiVerseBy TechAiVerseJuly 19, 2025No Comments4 Mins Read3 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Popular npm linter packages hijacked via phishing to drop malware
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Popular npm linter packages hijacked via phishing to drop malware

    Popular JavaScript libraries were hijacked this week and turned into malware droppers, in a supply chain attack achieved via targeted phishing and credential theft.

    The npm package eslint-config-prettier, downloaded over 30 million times weekly, was compromised after its maintainer fell victim to a phishing attack. Other packages, namely eslint-plugin-prettier, synckit, @pkgr/core, and napi-postinstall from the same maintainer, were also targeted.

    The attacker(s) used stolen credentials to publish multiple unauthorized versions of the packages with malicious code to infect Windows machines.

    Maintainer phished, libraries compromised

    On July 18th, developers began noticing unusual behavior after installing versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7 of eslint-config-prettier. These versions were published to the npm registry but had no corresponding changes in the GitHub repository that’d corroborate the releases, raising immediate suspicion within the open-source community.

    Libraries like eslint-config-prettier and eslint-plugin-prettier make it easier for developers to work with Prettier and ESLint by ensuring that the code formatting rules are consistenly styled across the project without conflicts or rendundant linting.

    Developer Dasa Paddock initially raised a GitHub issue in the project’s repository shedding light on the matter and community members quickly chimed in.

    Shortly afterward, the package’s maintainer, JounQin, confirmed that he had fallen victim to a phishing attack. This allowed an unauthorized party to gain access to his npm token and publish the compromised versions.

    “It’s this phishing email,” wrote JounQin, sharing a screenshot of a convincing “Verify your account” email he had received:

    Phishing email received by npm library’s maintainer (JounQin)

    The email has been spoofed to appear to originate from “support@npmjs.com,” but the link in it leads the user to an illicit npnjs[.]com domain.

    “I’ve deleted that npm token and will publish a new version ASAP,” stated JounQin.

    “Thanks all, and sorry for my negligence,” continued writing the maintainer in the same thread.

    Malicious postinstall script runs a Windows DLL

    In the malicious versions, an npm postinstall script “install.js” is configured to run as soon as the package is installed.

    This “install.js” contains a suspicious function logDiskSpace(), which, contrary to its name isn’t concerned with disk space monitoring. Instead, the function attempts to execute the DLL “node-gyp.dll” bundled within the package, via the rundll32 Windows system process.

    Malicious function in the install.js file (BleepingComputer)

    At the time of writing, the DLL, a recognized trojan, has a 19/72 detection score on VirusTotal, which means it is still being missed by a majority of antivirus engines.

    What should you do?

    • Do not install the following versions of the affected packages:

      • eslint-config-prettier versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7.

      • eslint-plugin-prettier versions 4.2.2 and 4.2.3.

      • synckit version 0.11.9

      • @pkgr/core version 0.2.8

      • napi-postinstall version 0.3.1

    • Verify your package-lock.json or yarn.lock files for references to these versions.

    • If you deployed builds after July 18th, check CI logs and runtime environments for signs of compromise, especially on Windows machines.

    • Consider rotating any secrets that may have been exposed during affected build processes.

    The maintainer additionally marked the affected versions as “deprecated” on the npmjs registry. Additionally, a GitHub user cautioned that any other packages published by the maintainer also be checked for potential signs of tampering.

    Compromised versions marked deprecated on npmjs (BleepingComputer)

    The compromise follows a series of similar social engineering attacks that have targeted developers of popular libraries in recent times.

    In March, more than ten widely used npm libraries were compromised and turned into info-stealers. Last month, 17 Gluestack packages with over a million weekly downloads were hijacked to deploy a Remote Access Trojan (RAT).

    As the open-source ecosystem largely operates on trust, incidents like these underscore the fragility of supply chain security and the importance of maintainer security. One wrong click is enough to put millions of users at risk.

    Update, 19-Jul-2025 12:42 PM ET: Added names of additional packages impacted.


    The Board Report Deck CISOs Actually Use

    CISOs know that getting board buy-in starts with a clear, strategic view of how cloud security drives business value.

    This free, editable board report deck helps security leaders present risk, impact, and priorities in clear business terms. Turn security updates into meaningful conversations and faster decision-making in the boardroom.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleChatGPT”s GPT-5-reasoning-alpha model spotted ahead of launch
    Next Article Threat actors downgrade FIDO2 MFA auth in PoisonSeed phishing attack
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Major iPhone update: iOS 26.3 makes switching to Android and third-party smartwatches easier

    February 13, 2026

    “The world is in peril”: Anthropic’s head of AI safety resigns, unable to reconcile his work with his values

    February 13, 2026

    Xiaomi 17 Ultra falls behind Apple iPhone 17 Pro in camera test

    February 13, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025670 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025259 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025153 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025112 Views
    Don't Miss
    Technology February 13, 2026

    Major iPhone update: iOS 26.3 makes switching to Android and third-party smartwatches easier

    Major iPhone update: iOS 26.3 makes switching to Android and third-party smartwatches easier – NotebookCheck.net…

    “The world is in peril”: Anthropic’s head of AI safety resigns, unable to reconcile his work with his values

    Xiaomi 17 Ultra falls behind Apple iPhone 17 Pro in camera test

    Haru Mini retro camera takes on Kodak Charmera with a 20MP sensor in tiny retro SLR body

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Major iPhone update: iOS 26.3 makes switching to Android and third-party smartwatches easier

    February 13, 20263 Views

    “The world is in peril”: Anthropic’s head of AI safety resigns, unable to reconcile his work with his values

    February 13, 20263 Views

    Xiaomi 17 Ultra falls behind Apple iPhone 17 Pro in camera test

    February 13, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.