The Node.js ecosystem faced a critical supply chain attack this week as several popular npm packages, including eslint-config-prettier and eslint-plugin-prettier were compromised through a coordinated phishing campaign.
The breach highlights growing concerns about the security of open-source maintainers. It highlights the ease with which credentials can be harvested and abused to spread malicious code throughout developer pipelines.
This targeted attack began with a deceptive email referencing the typosquatted domain npnjs.com, nearly indistinguishable from the legitimate npmjs.com.
A maintainer inadvertently entered their npm credentials on this fake site, allowing attackers to hijack their npm token immediately.
With this critical piece of authentication, adversaries were able to publish compromised versions of several high-traffic packages directly to the npm registry, thereby bypassing GitHub workflows and source-control-based monitoring.
The damage was swift and precise. Malicious versions published include:
eslint-config-prettier: 8.10.1, 9.1.1, 10.1.6, 10.1.7eslint-plugin-prettier: 4.2.2, 4.2.3synckit: 0.11.9@pkgr/core: 0.2.8napi-postinstall: 0.3.1Forensics revealed injected code targeting Windows environments, attempting to load a rogue node-gyp.dll via rundll32.
Such a payload could grant adversaries remote code execution on any affected developer or CI machine, potentially compromising applications across thousands of projects.
The popularity of Prettier and ESLint integrations amplifies the reach of this attack.
Automated tools like Dependabot and Renovate routinely update dependencies to the latest published versions, meaning countless projects may have unknowingly imported compromised packages.
With no visible GitHub history for these poisoned releases, the attack evaded standard codebase review processes until a vigilant user flagged suspicious activity.
Maintainers acted quickly:
Security experts advise all developers to:
eslint-config-prettier 10.1.5 or earlier).node_modulesClear the npm cache and reinstall clean dependencies if packages were updated recently.This incident serves as a stark reminder that open-source supply chains are only as strong as their weakest link.
With attackers now leveraging scraped maintainer metadata for efficient, high-value phishing, the need for proactive security controls and real-time package monitoring, such as that provided by tools like Socket, has never been greater.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…