Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
10 Malicious npm Packages Caught Stealing Developer Credentials
Advertisements

Cybersecurity researchers have uncovered a significant threat within the npm registry, identifying a set of 10 malicious packages designed to deploy an information stealer. The campaign targeted developers using Windows, Linux, and macOS operating systems. The packages, which were uploaded to the registry on July 4, 2025, successfully accumulated over 9,900 downloads before being discovered. The operation relied on typosquatting, with the malicious packages impersonating widely-used libraries such as TypeScript, discord.js, ethers.js, nodemon, and react-router-dom to trick developers into installing them.

Multi-Stage Attack and Obfuscation

The malware employed a sophisticated, multi-stage attack chain to execute its payload and evade detection. According to Socket security researcher Kush Pandya, “The malware uses four layers of obfuscation to hide its payload, displays a fake CAPTCHA to appear legitimate, fingerprints victims by IP address, and downloads a 24MB PyInstaller-packaged information stealer.” This final payload was engineered to harvest a wide range of sensitive data. The information stealer specifically targeted credentials stored in system keyrings, web browsers, and various authentication services across all three major desktop operating systems.

Identified Malicious Packages

The campaign’s success was driven by its use of convincing, slightly altered names of popular packages. The following 10 npm packages have been confirmed as being part of this credential theft operation:

deezcord.js
dezcord.js
dizcordjs
etherdjs
ethesjs
ethetsjs
nodemonjs
react-router-dom.js
typescriptjs
zustand.js

Developers who may have installed any of these packages are directly affected by the credential harvesting malware. The combined download count of over 9,900 indicates a substantial number of systems were compromised by this supply chain attack.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading