Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

‘Critical Severity’ Warning: Malware Found in Widely Deployed npm Packages

Software supply chain security jitters escalated again Friday with new “critical severity” warnings about malware embedded in two npm package managers widely used by some of the biggest names in tech.

Software supply chain security jitters escalated again Friday with new “critical severity” warnings about malware embedded in two npm package managers widely used by some of the biggest names in tech.

According to separate advisories from GitHub, confirmed by the npm security team, two popular npm package managers — the Coa parser and the rc configuration loader — were compromised and rigged with password-stealing malware.

The npm security team confirmed that the package rc had versions published with malicious code. Users of affected versions (1.2.9, 1.3.9, and 2.3.9) should downgrade to 1.2.8 as soon as possible and check their systems for suspicious activity.

The rc package is widely distributed and used by major tech organizations and counts more than 14 million weekly downloads.

The exact issue also hit the Coa parser for command line options.  Coa counts about 8.8 million downloads per week and is another link in the open-source software supply chain.

“Any computer that has [the vulnerable] package installed or running should be considered fully compromised,” GitHub warned. 

[READ: Malware Found Embedded in Popular JavaScript Library ]

“All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it,” the company added.

This is the second major npm package manager breach involving malware silently planted in a popular JavaScript library.  In late October, security response professionals were scrambling to assess the damage from crypto-mining and password-stealing malware embedded ua-parser-js, an npm package (JavaScript library) that counts close to 8 million downloads per week.

The hack raised eyebrows because of the software supply chain implications and prompted an extremely urgent warning from GitHub that any computer with the embedded npm package “should be considered fully compromised.”

“The npm package ua-parser-js had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity,” GitHub said.

Related: Malware Found Embedded in Popular JavaScript Library

Related: Critical Flaw in Pac-Resolver NPM Package Affects 290,000 Repositories

Related: Vulnerability in ‘netmask’ npm Package Affects 280,000 Projects

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.