Widespread Supply Chain Attacks Targeting PyPI and npm Package Repositories
CriticalFebruary 25, 2026

Widespread Supply Chain Attacks Targeting PyPI and npm Package Repositories

Multiple malicious packages discovered in PyPI and npm repositories executing credential theft and crypto mining payloads. Supply chain attacks leverage typosquatting and dependency confusion techniques to compromise development environments.

Software DevelopmentTechnologyFinancial ServicesHealthcareGovernmentManufacturing
📈

Executive Summary

Security researchers have identified an extensive malware campaign targeting both PyPI and npm package repositories, with hundreds of malicious packages discovered in recent months. The attacks primarily utilize typosquatting and dependency confusion techniques to trick developers into installing compromised packages that execute credential theft, crypto mining, and data exfiltration payloads. The campaign demonstrates sophisticated operational security, with attackers using automated package creation and multiple command-and-control infrastructures to evade detection. Impact analysis indicates potential compromise of development environments, CI/CD pipelines, and production systems across organizations using affected packages. Organizations are advised to implement strict package verification processes and automated security scanning.

Key Findings
  • Security researchers have identified an extensive malware campaign targeting both PyPI and npm package repositories, with hundreds of malicious packages discovered in recent months
  • The attacks primarily utilize typosquatting and dependency confusion techniques to trick developers into installing compromised packages that execute credential theft, crypto mining, and data exfiltration payloads
  • The campaign demonstrates sophisticated operational security, with attackers using automated package creation and multiple command-and-control infrastructures to evade detection
  • Impact analysis indicates potential compromise of development environments, CI/CD pipelines, and production systems across organizations using affected packages

Overview

A coordinated malware campaign targeting Python Package Index (PyPI) and Node Package Manager (npm) repositories has been discovered, representing a significant supply chain security threat to organizations utilizing these package management systems. The campaign involves the distribution of hundreds of malicious packages designed to compromise development environments and production systems.

Attack Vectors

  • Typosquatting: Creation of packages with names similar to popular libraries
  • Dependency confusion attacks exploiting internal package naming
  • Automated package publication and update mechanisms
  • Obfuscated malicious code injection in package installation scripts

Technical Analysis

The malicious packages employ multiple stages of execution to evade detection:

  • Initial stage involves benign-looking installation scripts
  • Secondary payload retrieval from attacker-controlled infrastructure
  • Anti-analysis techniques including environment checking
  • Fileless execution of credential harvesting modules

Malware Capabilities

  • Theft of environment variables and API keys
  • Harvesting of Git credentials and SSH keys
  • Cryptocurrency mining payload deployment
  • Data exfiltration to multiple C2 servers

Impact Assessment

The campaign poses severe risks to:

  • Development environment integrity
  • CI/CD pipeline security
  • Production system compromise
  • Intellectual property theft
  • Resource theft via crypto mining

Recommendations

  • Implement strict package verification processes
  • Deploy automated security scanning in development pipelines
  • Use private package repositories with vetted mirrors
  • Enable multi-factor authentication for package management
  • Conduct dependency audit and cleanup
  • Monitor for unusual system behavior and resource usage

Indicators of Compromise

Known Malicious Packages

  • python-requests-http
  • python-urllib3-ssl
  • react-native-analytics
  • node-crypto-miner

C2 Infrastructure

  • cdn-package[.]com
  • npm-install[.]net
  • pypi-cdn[.]org
Software DevelopmentTechnologyFinancial ServicesHealthcareGovernmentManufacturing
supply chain attackPyPInpmpackage repositorytyposquattingdependency confusioncredential theftcrypto miningsoftware developmentmalware
📅February 25, 2026
🕒Feb 25, 2026
🔗3 sources

Related Briefs

🛡
CriticalApr 1, 2026

Implantable Orthopedic Device Maker Breach: Threat Analysis

A recent hack of an implantable orthopedic device maker has significant implications for the healthcare and medical device sectors. The breach highlights the vulnerability of connected medical devices to cyber threats. As of April 1, 2026, the incident is under investigation.

Critical Vulnerability in Python Requests Library: Insecure Temp File Handling
CriticalMar 29, 2026

Critical Vulnerability in Python Requests Library: Insecure Temp File Handling

A critical vulnerability (CVE-2026-25645) has been identified in the Python Requests library's extract_zipped_paths() utility function, enabling potential arbitrary file writes through insecure temporary file handling. This vulnerability affects applications using the Requests library for handling zipped file paths.