Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
PhantomRaven Malware Campaign Infects 126 npm Packages to Steal GitHub Tokens
Advertisements

Cybersecurity researchers have identified an active software supply chain attack targeting the npm registry, involving a campaign codenamed PhantomRaven. Discovered by Koi Security, this operation has deployed over 100 malicious packages specifically engineered to compromise developer environments. The primary objective of the malware is to exfiltrate valuable assets such as authentication tokens, secrets from Continuous Integration/Continuous Deployment (CI/CD) pipelines, and GitHub credentials directly from developers’ machines.

Campaign Scope and Timeline

The activity associated with PhantomRaven is assessed to have begun in August 2025, which is when the first malicious packages were uploaded to the public repository. Over the following months, the campaign escalated significantly, ballooning to a total of 126 distinct malicious npm libraries. This collection of packages has been installed by developers more than 86,000 times, demonstrating the extensive reach of the attack within the software development community. The ongoing nature of the campaign indicates a persistent threat to users of the npm ecosystem.

Attack Method and Flagged Packages

What makes the PhantomRaven attack particularly notable is its method of payload delivery. The attackers concealed the malicious code within the package dependencies. Instead of bundling the code directly, they pointed to a custom HTTP URL. This causes the npm client to fetch the malicious components from an untrusted, attacker-controlled website during the installation process. The DevSecOps company DCODX has also flagged several of the packages involved. Among those identified are op-cli-installer with 486 downloads, unused-imports with 1,350 downloads, badgekit-api-client with 483 downloads, polyfill-corejs3 with 475 downloads, and eslint-comments with 936 downloads.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading