Navigation
Recherche
|
Destructive Malware Available In NPM Repo Went Unnoticed For 2 Years
vendredi 23 mai 2025, 00:00 , par Slashdot
![]() 'What makes this campaign particularly concerning is the diversity of attack vectors -- from subtle data corruption to aggressive system shutdowns and file deletion,' Pandya wrote. 'The packages were designed to target different parts of the JavaScript ecosystem with varied tactics.' Some of the payloads were limited to detonate only on specific dates in 2023, but in some cases a phase that was scheduled to begin in July of that year was given no termination date. Pandya said that means the threat remains persistent, although in an email he also wrote: 'Since all activation dates have passed (June 2023-August 2024), any developer following normal package usage today would immediately trigger destructive payloads including system shutdowns, file deletion, and JavaScript prototype corruption.' The list of malicious packages included js-bomb, js-hood, vite-plugin-bomb-extend, vite-plugin-bomb, vite-plugin-react-extend, vite-plugin-vue-extend, vue-plugin-bomb, and quill-image-downloader. Read more of this story at Slashdot.
https://yro.slashdot.org/story/25/05/22/2012209/destructive-malware-available-in-npm-repo-went-unnot...
Voir aussi |
56 sources (32 en français)
Date Actuelle
sam. 24 mai - 14:33 CEST
|