npm registry exploited in credential-phishing campaign via malicious packages

Researchers discovered 175 malicious npm packages that in total were downloaded around 26,000 times. These packages don’t execute malware on install; instead, they host HTML/JavaScript redirect scripts via npm’s registry and the unpkg CDN to funnel users towards credential-harvesting phishing pages. The campaign, dubbed “Beamglea,” targeted over 135 organizations across industrial, technology, and energy sectors. Attackers automated the creation of packages and phishing infrastructure, embedding victim emails into redirects to increase legitimacy. The abuse of trusted infrastructure without traditional malware underlines how threat actors are evolving to exploit software ecosystems.

https://thehackernews.com/2025/10/175-malicious-npm-packages-with-26000.html

Comments

Popular posts from this blog

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities

OWASP SAMM Skills Framework Enhances Software Security Roles