New malicious npm package 'ambar-src' targets developers with open source malware
A malicious npm package named "ambar-src" reached 50,000 downloads in days before being removed from the registry. It uses a preinstall script to execute malicious code during installation, targeting Windows, Linux, and macOS systems. The package employs detection evasion techniques and deploys powerful open-source malware variants. It abuses npm's preinstall script hook to trigger the payload without explicit invocation. The malware fetches additional payloads from remote servers and uses Yandex Cloud for command and control. Affected systems should be considered fully compromised, requiring immediate incident response actions. The attack highlights the speed at which supply chain risks can propagate and confirms that npm install is a high-risk action.
AI Analysis
Technical Summary
The 'ambar-src' npm package represents a sophisticated supply chain malware attack targeting developers and organizations using the npm ecosystem. This malicious package was uploaded to the npm registry and quickly amassed over 50,000 downloads before being detected and removed. It abuses the npm lifecycle preinstall script hook to execute malicious code automatically during package installation without requiring explicit user invocation. This technique allows the malware to run stealthily across multiple operating systems, including Windows, Linux, and macOS. The malware employs detection evasion strategies to avoid being caught by traditional antivirus or endpoint detection systems. Once executed, it fetches additional payloads from remote servers, establishing command and control (C2) communications via Yandex Cloud infrastructure, a legitimate cloud service abused to mask malicious traffic. The payloads include powerful open-source malware variants such as Apfell and Mythic agents, which enable advanced capabilities like reverse SSH tunnels (T1102 technique) for persistent remote access and control. The infection compromises the confidentiality, integrity, and availability of affected systems, effectively granting attackers full control. The attack underscores the rapid propagation potential of supply chain threats in open source environments and the inherent risks of executing npm install commands without stringent security controls. No CVSS score is provided, but the threat's complexity, stealth, and broad platform targeting indicate a high severity level.
Potential Impact
This threat poses significant risks to organizations worldwide, especially those relying on npm packages for software development and deployment. The automatic execution of malicious code during installation can lead to widespread compromise of developer workstations, build servers, and production environments. Attackers gain persistent remote access, enabling data exfiltration, intellectual property theft, lateral movement, and deployment of additional malware. The use of legitimate cloud infrastructure for C2 complicates detection and response efforts. Supply chain compromise undermines trust in open source ecosystems and can disrupt software supply chains, causing operational and reputational damage. Organizations may face costly incident response, potential regulatory penalties, and erosion of customer trust. The cross-platform nature of the malware increases the scope of affected systems, amplifying the potential impact across diverse IT environments.
Mitigation Recommendations
1. Implement strict controls on npm package usage: enforce policies to vet and approve third-party packages before use. 2. Disable or restrict npm lifecycle scripts execution, especially preinstall scripts, in development and CI/CD environments. 3. Employ software composition analysis (SCA) tools to detect malicious or suspicious packages proactively. 4. Monitor network traffic for connections to known malicious domains such as 'x-ya.ru' and 'function.yandexcloud.ru' and block them at the firewall or proxy level. 5. Use endpoint detection and response (EDR) solutions capable of detecting unusual script execution and lateral movement behaviors. 6. Conduct regular audits of installed npm packages and remove any unapproved or suspicious dependencies. 7. Educate developers and DevOps teams about supply chain risks and safe package management practices. 8. Implement network segmentation to limit the blast radius of compromised developer machines. 9. Maintain up-to-date backups and incident response plans to quickly recover from compromises. 10. Leverage threat intelligence feeds to stay informed about emerging malicious packages and indicators of compromise (IOCs).
Affected Countries
United States, India, Germany, United Kingdom, China, Canada, Australia, France, Netherlands, Japan, South Korea
Indicators of Compromise
- hash: 4a3e7683e0864a04fd34e818709d176b
- hash: 8d65244501aeaf8b5bfd05b3e52d156e
- hash: 9a8c2a83f66f49b88e36d28894a34009
- hash: b0c20b80369f2fe984b478b911b59a19
- hash: f8ca2c8d74f0785c549f09c36147cd0e
- hash: fc108967f5b1ff6ae35cd201b88a62a6
- hash: 40db994eb2868b325922bf9afcb9bc63bea5e2ea
- hash: a2e08d4f1d0189f29b8f4582643ba74e00c72e81
- hash: b87ed18ed62fd638d57729d27fbb58eb87a1848b
- hash: d6297ff0e5dc114081e0b900e0ebb72bbe1af680
- hash: 1e6fa5021db4dd40b571cc4e654a71c22d0f607d13fb8a4a5a46a64060f3071e
- hash: 492f2366ece5c544a4062da14da5883bc825d6f2bc58cda975799dca9f85b150
- hash: 521ade4aeb95039e1712f8284eba333199fc819f1e0f9db41d6bc9849b131109
- hash: 83e131a2761d6f3a5636cf329182242a927a618174dd440989dc9286be4edeac
- hash: 8963568963f770e237bff2b228106e4ce7ebb0a1af0e0cf7b26028bdc8515bc5
- hash: 9b76e275d989ebc3b43911a5e1d2b64ef9544a6b1dbc69a3412bd0ccadaed567
- domain: x-ya.ru
- domain: function.yandexcloud.ru
New malicious npm package 'ambar-src' targets developers with open source malware
Description
A malicious npm package named "ambar-src" reached 50,000 downloads in days before being removed from the registry. It uses a preinstall script to execute malicious code during installation, targeting Windows, Linux, and macOS systems. The package employs detection evasion techniques and deploys powerful open-source malware variants. It abuses npm's preinstall script hook to trigger the payload without explicit invocation. The malware fetches additional payloads from remote servers and uses Yandex Cloud for command and control. Affected systems should be considered fully compromised, requiring immediate incident response actions. The attack highlights the speed at which supply chain risks can propagate and confirms that npm install is a high-risk action.
AI-Powered Analysis
Technical Analysis
The 'ambar-src' npm package represents a sophisticated supply chain malware attack targeting developers and organizations using the npm ecosystem. This malicious package was uploaded to the npm registry and quickly amassed over 50,000 downloads before being detected and removed. It abuses the npm lifecycle preinstall script hook to execute malicious code automatically during package installation without requiring explicit user invocation. This technique allows the malware to run stealthily across multiple operating systems, including Windows, Linux, and macOS. The malware employs detection evasion strategies to avoid being caught by traditional antivirus or endpoint detection systems. Once executed, it fetches additional payloads from remote servers, establishing command and control (C2) communications via Yandex Cloud infrastructure, a legitimate cloud service abused to mask malicious traffic. The payloads include powerful open-source malware variants such as Apfell and Mythic agents, which enable advanced capabilities like reverse SSH tunnels (T1102 technique) for persistent remote access and control. The infection compromises the confidentiality, integrity, and availability of affected systems, effectively granting attackers full control. The attack underscores the rapid propagation potential of supply chain threats in open source environments and the inherent risks of executing npm install commands without stringent security controls. No CVSS score is provided, but the threat's complexity, stealth, and broad platform targeting indicate a high severity level.
Potential Impact
This threat poses significant risks to organizations worldwide, especially those relying on npm packages for software development and deployment. The automatic execution of malicious code during installation can lead to widespread compromise of developer workstations, build servers, and production environments. Attackers gain persistent remote access, enabling data exfiltration, intellectual property theft, lateral movement, and deployment of additional malware. The use of legitimate cloud infrastructure for C2 complicates detection and response efforts. Supply chain compromise undermines trust in open source ecosystems and can disrupt software supply chains, causing operational and reputational damage. Organizations may face costly incident response, potential regulatory penalties, and erosion of customer trust. The cross-platform nature of the malware increases the scope of affected systems, amplifying the potential impact across diverse IT environments.
Mitigation Recommendations
1. Implement strict controls on npm package usage: enforce policies to vet and approve third-party packages before use. 2. Disable or restrict npm lifecycle scripts execution, especially preinstall scripts, in development and CI/CD environments. 3. Employ software composition analysis (SCA) tools to detect malicious or suspicious packages proactively. 4. Monitor network traffic for connections to known malicious domains such as 'x-ya.ru' and 'function.yandexcloud.ru' and block them at the firewall or proxy level. 5. Use endpoint detection and response (EDR) solutions capable of detecting unusual script execution and lateral movement behaviors. 6. Conduct regular audits of installed npm packages and remove any unapproved or suspicious dependencies. 7. Educate developers and DevOps teams about supply chain risks and safe package management practices. 8. Implement network segmentation to limit the blast radius of compromised developer machines. 9. Maintain up-to-date backups and incident response plans to quickly recover from compromises. 10. Leverage threat intelligence feeds to stay informed about emerging malicious packages and indicators of compromise (IOCs).
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.tenable.com/blog/cybersecurity-research-faq-new-malicious-npm-package-ambar-src"]
- Adversary
- null
- Pulse Id
- 69a161489d57df80623a8b5c
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash4a3e7683e0864a04fd34e818709d176b | — | |
hash8d65244501aeaf8b5bfd05b3e52d156e | — | |
hash9a8c2a83f66f49b88e36d28894a34009 | — | |
hashb0c20b80369f2fe984b478b911b59a19 | — | |
hashf8ca2c8d74f0785c549f09c36147cd0e | — | |
hashfc108967f5b1ff6ae35cd201b88a62a6 | — | |
hash40db994eb2868b325922bf9afcb9bc63bea5e2ea | — | |
hasha2e08d4f1d0189f29b8f4582643ba74e00c72e81 | — | |
hashb87ed18ed62fd638d57729d27fbb58eb87a1848b | — | |
hashd6297ff0e5dc114081e0b900e0ebb72bbe1af680 | — | |
hash1e6fa5021db4dd40b571cc4e654a71c22d0f607d13fb8a4a5a46a64060f3071e | — | |
hash492f2366ece5c544a4062da14da5883bc825d6f2bc58cda975799dca9f85b150 | — | |
hash521ade4aeb95039e1712f8284eba333199fc819f1e0f9db41d6bc9849b131109 | — | |
hash83e131a2761d6f3a5636cf329182242a927a618174dd440989dc9286be4edeac | — | |
hash8963568963f770e237bff2b228106e4ce7ebb0a1af0e0cf7b26028bdc8515bc5 | — | |
hash9b76e275d989ebc3b43911a5e1d2b64ef9544a6b1dbc69a3412bd0ccadaed567 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainx-ya.ru | — | |
domainfunction.yandexcloud.ru | — |
Threat ID: 69a16a0332ffcdb8a2171d2a
Added to database: 2/27/2026, 9:55:15 AM
Last enriched: 2/27/2026, 10:14:58 AM
Last updated: 2/28/2026, 6:10:59 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Maltrail IOC for 2026-02-28
MediumThreatFox IOCs for 2026-02-27
MediumMaltrail IOC for 2026-02-27
MediumFake Fedex Email Delivers Donuts!, (Fri, Feb 27th)
MediumNew Dohdoor malware campaign targets education and health care
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.