Widespread Supply Chain Attacks Targeting PyPI and npm Package Repositories
CriticalFebruary 25, 2026

Widespread Supply Chain Attacks Targeting PyPI and npm Package Repositories

Multiple malicious packages discovered in PyPI and npm repositories executing credential theft and crypto mining payloads. Supply chain attacks leverage typosquatting and dependency confusion techniques to compromise development environments.

Software DevelopmentTechnologyFinancial ServicesHealthcareGovernmentManufacturing
📈

Executive Summary

Security researchers have identified an extensive malware campaign targeting both PyPI and npm package repositories, with hundreds of malicious packages discovered in recent months. The attacks primarily utilize typosquatting and dependency confusion techniques to trick developers into installing compromised packages that execute credential theft, crypto mining, and data exfiltration payloads. The campaign demonstrates sophisticated operational security, with attackers using automated package creation and multiple command-and-control infrastructures to evade detection. Impact analysis indicates potential compromise of development environments, CI/CD pipelines, and production systems across organizations using affected packages. Organizations are advised to implement strict package verification processes and automated security scanning.

Key Findings
  • Security researchers have identified an extensive malware campaign targeting both PyPI and npm package repositories, with hundreds of malicious packages discovered in recent months
  • The attacks primarily utilize typosquatting and dependency confusion techniques to trick developers into installing compromised packages that execute credential theft, crypto mining, and data exfiltration payloads
  • The campaign demonstrates sophisticated operational security, with attackers using automated package creation and multiple command-and-control infrastructures to evade detection
  • Impact analysis indicates potential compromise of development environments, CI/CD pipelines, and production systems across organizations using affected packages

Overview

A coordinated malware campaign targeting Python Package Index (PyPI) and Node Package Manager (npm) repositories has been discovered, representing a significant supply chain security threat to organizations utilizing these package management systems. The campaign involves the distribution of hundreds of malicious packages designed to compromise development environments and production systems.

Attack Vectors

  • Typosquatting: Creation of packages with names similar to popular libraries
  • Dependency confusion attacks exploiting internal package naming
  • Automated package publication and update mechanisms
  • Obfuscated malicious code injection in package installation scripts

Technical Analysis

The malicious packages employ multiple stages of execution to evade detection:

  • Initial stage involves benign-looking installation scripts
  • Secondary payload retrieval from attacker-controlled infrastructure
  • Anti-analysis techniques including environment checking
  • Fileless execution of credential harvesting modules

Malware Capabilities

  • Theft of environment variables and API keys
  • Harvesting of Git credentials and SSH keys
  • Cryptocurrency mining payload deployment
  • Data exfiltration to multiple C2 servers

Impact Assessment

The campaign poses severe risks to:

  • Development environment integrity
  • CI/CD pipeline security
  • Production system compromise
  • Intellectual property theft
  • Resource theft via crypto mining

Recommendations

  • Implement strict package verification processes
  • Deploy automated security scanning in development pipelines
  • Use private package repositories with vetted mirrors
  • Enable multi-factor authentication for package management
  • Conduct dependency audit and cleanup
  • Monitor for unusual system behavior and resource usage

Indicators of Compromise

Known Malicious Packages

  • python-requests-http
  • python-urllib3-ssl
  • react-native-analytics
  • node-crypto-miner

C2 Infrastructure

  • cdn-package[.]com
  • npm-install[.]net
  • pypi-cdn[.]org
Software DevelopmentTechnologyFinancial ServicesHealthcareGovernmentManufacturing
supply chain attackPyPInpmpackage repositorytyposquattingdependency confusioncredential theftcrypto miningsoftware developmentmalware
📅February 25, 2026
🕒1h ago
🔗3 sources

Related Briefs

Salt Typhoon APT Campaign Targets US Telecommunications Infrastructure
CriticalFeb 25, 2026

Salt Typhoon APT Campaign Targets US Telecommunications Infrastructure

Chinese state-sponsored threat actor Salt Typhoon (aka Bronze Silhouette) conducts persistent intrusion campaign against US telecommunications providers. The group employs sophisticated living-off-the-land techniques and custom malware to maintain long-term access to critical infrastructure.

Mass VMware ESXi Ransomware Campaign Targeting Virtual Infrastructure
CriticalFeb 10, 2026

Mass VMware ESXi Ransomware Campaign Targeting Virtual Infrastructure

Large-scale ransomware campaign exploiting VMware ESXi vulnerabilities to encrypt virtual machines and disrupt business operations. Attackers leverage CVE-2021-21974 to compromise unpatched systems globally.