Open Nav
Sign Up

Malicious npm Packages Target Developers with Multi-OS Info-Stealer Payloads

malicious npm packages

Filip Dimitrov

October 31, 2025

A new software supply-chain attack has been uncovered involving ten malicious npm packages designed to steal developer credentials across Windows, macOS, and Linux systems. These packages impersonate well-known open-source libraries such as TypeScript, discord.js, ethers.js, nodemon, react-router-dom, and zustand, aiming to infiltrate developer workflows and CI/CD environments.

Once installed, the malware displays a fake CAPTCHA prompt, fingerprints the victim’s host, and downloads a 24 MB cross-platform information-stealer from the remote command-and-control (C2) server 195.133.79.43.

Confirmed Malicious Packages

Package NameLegitimate Library ImpersonatedNotes
nodejs-devtoolNode.jsFake developer utility containing payload installer
typescript-tools-devTypeScriptMimics TypeScript support library
discord-bot-clientdiscord.jsTargets developers of Discord bots
react-router-dom-proreact-router-domInjected fake router build
ethers-connectethers.jsWallet integration spoof
zustand-devzustandMalicious state-management clone
nodemon-corenodemonFake hot-reload module
api-express-coreExpressPretends to add Express helpers
vue-dev-server-toolsVue.jsMalicious front-end helper
snyk-security-toolssnykImpersonates a popular security scanner

Impacted Ecosystem

  • Developers and organizations using npm or automated package pipelines.
  • Build systems pulling dependencies via package.json without integrity checks.
  • Potential compromise of private repositories, build credentials, and cloud access tokens.

Mitigation Recommendations

Audit npm installations using npm list or npm audit to confirm none of the malicious packages are present. If any are detected, please proceed with the following steps:

  1. Uninstall and clean systems affected by any of the packages listed.
  2. Rotate credentials: SSH keys, npm tokens, and repository access tokens.
  3. Implement package-signature enforcement (–ignore-scripts for untrusted sources).
  4. Integrate dependency scanning into CI/CD pipelines.
  5. Monitor outbound traffic for connections to 195.133.79.43 or related indicators.

Stay Safe. Stay Secure.
OP Innovate Research Team

Under Cyber Attack?

Fill out the form and we will contact you immediately.