AUTO-UPDATED

Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens

Cybersecurity researchers have identified a self-propagating supply chain worm, dubbed CanisterSprawl, that steals developer npm tokens to compromise packages and exfiltrate sensitive credentials from infected software development environments.

Key Points

  • The CanisterSprawl worm targets npm packages, including @automagik/genie and pgserve, using postinstall hooks to execute malicious code.
  • Stolen data includes SSH keys, cloud credentials for AWS and Azure, Kubernetes configurations, and cryptocurrency wallet information.
  • The malware uses Internet Computer Protocol (ICP) canisters to exfiltrate data, making the malicious infrastructure highly resilient to takedowns.
  • The campaign features cross-language propagation, generating Python payloads to infect PyPI repositories alongside npm packages.
  • Researchers also identified separate, ongoing supply chain attacks targeting GitHub Actions workflows and legitimate Python packages like xinference.

Why it Matters

These attacks highlight a growing trend of automated, self-replicating threats that turn individual developer machines into distribution points for further malware. By compromising CI/CD pipelines and package registries, attackers can bypass traditional security perimeters to gain persistent access to sensitive cloud and infrastructure credentials.
Internet Published by info@thehackernews.com (The Hacker News)
Read original