Virtual Event Today: Cyber AI & Automation Summit - Register/Login Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

‘Critical Severity’ Warning: Malware Found in Widely Deployed npm Packages

Software supply chain security jitters escalated again Friday with new “critical severity” warnings about malware embedded in two npm package managers widely used by some of the biggest names in tech.

Software supply chain security jitters escalated again Friday with new “critical severity” warnings about malware embedded in two npm package managers widely used by some of the biggest names in tech.

According to separate advisories from GitHub, confirmed by the npm security team, two popular npm package managers — the Coa parser and the rc configuration loader — were compromised and rigged with password-stealing malware.

The npm security team confirmed that the package rc had versions published with malicious code. Users of affected versions (1.2.9, 1.3.9, and 2.3.9) should downgrade to 1.2.8 as soon as possible and check their systems for suspicious activity.

The rc package is widely distributed and used by major tech organizations and counts more than 14 million weekly downloads.

The exact issue also hit the Coa parser for command line options.  Coa counts about 8.8 million downloads per week and is another link in the open-source software supply chain.

“Any computer that has [the vulnerable] package installed or running should be considered fully compromised,” GitHub warned. 

[READ: Malware Found Embedded in Popular JavaScript Library ]

“All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it,” the company added.

Advertisement. Scroll to continue reading.

This is the second major npm package manager breach involving malware silently planted in a popular JavaScript library.  In late October, security response professionals were scrambling to assess the damage from crypto-mining and password-stealing malware embedded ua-parser-js, an npm package (JavaScript library) that counts close to 8 million downloads per week.

The hack raised eyebrows because of the software supply chain implications and prompted an extremely urgent warning from GitHub that any computer with the embedded npm package “should be considered fully compromised.”

“The npm package ua-parser-js had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity,” GitHub said.

Related: Malware Found Embedded in Popular JavaScript Library

Related: Critical Flaw in Pac-Resolver NPM Package Affects 290,000 Repositories

Related: Vulnerability in ‘netmask’ npm Package Affects 280,000 Projects

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.

Register

As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.