Cybersecurity researchers have identified a self-propagating supply chain worm, dubbed CanisterSprawl, that steals developer npm tokens to compromise packages and exfiltrate sensitive credentials from infected software development environments.
Key Points
- The CanisterSprawl worm targets npm packages, including @automagik/genie and pgserve, using postinstall hooks to execute malicious code.
- Stolen data includes SSH keys, cloud credentials for AWS and Azure, Kubernetes configurations, and cryptocurrency wallet information.
- The malware uses Internet Computer Protocol (ICP) canisters to exfiltrate data, making the malicious infrastructure highly resilient to takedowns.
- The campaign features cross-language propagation, generating Python payloads to infect PyPI repositories alongside npm packages.
- Researchers also identified separate, ongoing supply chain attacks targeting GitHub Actions workflows and legitimate Python packages like xinference.