A sophisticated npm supply chain attack is compromising developer environments, stealing sensitive credentials and data, and propagating through compromised packages, with significant overlap to previous TeamPCP attacks.
A new self-propagating malware strain is worming its way through npm packages, compromising developer environments and stealing sensitive data as it spreads through the software supply chain. The attack, discovered by security firms Socket and StepSecurity, shares significant overlap with the CanisterWorm infections attributed to TeamPCP last month, raising serious concerns about the integrity of open source software ecosystems.
The compromised packages, primarily from Namastex Labs, an agentic AI company, include versions of @automagik/genie, pgserve, @fairwords/websocket, @fairwords/loopback-connector-es, @openwebconcept/design-tokens, and @openwebconcept/theme-owc. These packages contain malicious code that executes at installation time, collecting tokens, credentials, API and SSH keys, and other secrets for cloud services, CI/CD systems, registries, Kubernetes and Docker configurations, and LLM platforms.
"This is not just a credential stealer," warned Socket researchers. "It is designed to turn one compromised developer environment into additional package compromises." The malware contains self-propagation logic that identifies packages a victim can publish, injects new payloads into those packages, and republishes them as malicious versions. It can also propagate to PyPI if Python credentials are found on victims' machines.
The exfiltration of stolen data occurs through both conventional webhooks and an ICP (Internet Computer Protocol) canister endpoint, using the hardcoded canister ID cjn37-uyaaa-aaaac-qgnva-cai. Additionally, the malware attempts to steal browser extension data associated with MetaMask and Phantom, along with local cryptocurrency wallet files including Solana, Ethereum, Bitcoin, Exodus, and Atomic Wallet data.
From a legal perspective, this attack raises significant data protection concerns under regulations like GDPR and CCPA. When personal data is stolen through these compromised packages, organizations using affected software may face mandatory breach notification requirements. Under GDPR, companies could face fines up to 4% of annual global turnover or €20 million, whichever is higher, for failing to protect personal data. Similarly, CCPA imposes obligations on businesses to implement reasonable security procedures and practices to protect personal information.
The payload's explicit reference to a "TeamPCP/LiteLLM method" for .pth file injection suggests a connection to previous attacks, though security researchers have stopped short of direct attribution. This pattern of supply chain attacks represents an evolution in cyber threats, moving beyond targeting individual organizations to compromising the foundational software development ecosystem itself.
For developers and organizations, this attack underscores critical compliance implications. Software supply chain security is no longer optional but a regulatory requirement in many jurisdictions. The EU's Cyber Resilience Act, expected to take effect soon, will impose specific requirements on software security, including supply chain security. Companies must implement robust package verification processes, conduct regular security audits of dependencies, and maintain comprehensive inventories of all software components.
The impact extends beyond immediate financial losses to include reputational damage, legal liabilities, and erosion of trust in open source software. Organizations using compromised packages may face cascading effects as their systems are breached, customer data is stolen, and their own software products become vectors for further attacks.
"In this newly discovered npm incident, the malware uses the same core adversarial methods: install-time execution, credential theft from developer environments, off-host exfiltration, canister-backed infrastructure, and self-propagation logic intended to compromise additional packages," Socket researchers noted. "The overlap is notable enough on its own, and malicious packages included an explicit code reference to a TeamPCP/LiteLLM method inside the malicious payload."
What changes are needed to address these threats? The security community must develop better package verification and signing mechanisms, enhanced detection systems for malicious packages, and improved transparency in open source dependencies. Developers need to adopt more robust security practices, including regular dependency audits, use of package integrity verification tools, and implementation of least-privilege access for development environments.
Regulators must continue to develop frameworks that address the unique challenges of software supply chain security while balancing innovation with protection. Organizations must treat supply chain security as a critical component of their overall cybersecurity strategy, investing in the tools and processes necessary to detect and respond to these evolving threats.
As the digital rights advocate group Electronic Frontier Foundation has noted, "The security of the software supply chain is fundamental to digital rights. When developers' environments are compromised, the integrity of the entire software ecosystem is at risk, affecting everyone who depends on that software."
The ongoing nature of this attack, with additional malicious versions still being published, highlights the persistent challenges in securing the software supply chain. Until more robust verification and detection mechanisms are implemented, developers and organizations must remain vigilant, regularly updating their dependencies and monitoring for suspicious activity in their development environments.

Comments
Please log in or register to join the discussion