The malicious package is named 1337qq-js and was uploaded on the npm repository on December 30, 2019.
The package was downloaded at least 32 times, before it was spotted and today by Microsoft’s Vulnerability Research team.
According to an analysis by the npm security team, the package exfiltrates sensitive information through install scripts and targets UNIX systems only.
The type of data it collects includes:
- Environment variables
- Running processes
- uname -a
- npmrc file
This marks the sixth incident of a malicious package making it on the npm repository index, although, this is the least severe, primarily because Microsoft security analysts caught the library two weeks after it was published and before it gained a serious following.
Previous incidents of malicious npm packages making it on npm include:
- June 2019 – a hacker backedoored the electron-native-notify library to insert malicious code that reached the Agama cryptocurrency wallet.
- November 2018 – a hacker backdoored the event-stream npm package to load malicious code inside the BitPay Copay desktop and mobile wallet apps, and steal cryptocurrency.
- July 2018 – a hacker compromised the ESLint library with malicious code that was designed to steal the npm credentials of other developers.
- May 2018 – a hacker tried to hide a backdoor in a popular npm package named getcookies.
Most of us are so used to the apps we rely on, it’s easy to …