Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New malicious npm package 'ambar-src' targets developers with open source malware

0
Medium
Published: Fri Feb 27 2026 (02/27/2026, 09:18:00 UTC)
Source: AlienVault OTX General

Description

A malicious npm package named "ambar-src" reached 50,000 downloads in days before being removed from the registry. It uses a preinstall script to execute malicious code during installation, targeting Windows, Linux, and macOS systems. The package employs detection evasion techniques and deploys powerful open-source malware variants. It abuses npm's preinstall script hook to trigger the payload without explicit invocation. The malware fetches additional payloads from remote servers and uses Yandex Cloud for command and control. Affected systems should be considered fully compromised, requiring immediate incident response actions. The attack highlights the speed at which supply chain risks can propagate and confirms that npm install is a high-risk action.

AI-Powered Analysis

AILast updated: 02/27/2026, 10:14:58 UTC

Technical Analysis

The 'ambar-src' npm package represents a sophisticated supply chain malware attack targeting developers and organizations using the npm ecosystem. This malicious package was uploaded to the npm registry and quickly amassed over 50,000 downloads before being detected and removed. It abuses the npm lifecycle preinstall script hook to execute malicious code automatically during package installation without requiring explicit user invocation. This technique allows the malware to run stealthily across multiple operating systems, including Windows, Linux, and macOS. The malware employs detection evasion strategies to avoid being caught by traditional antivirus or endpoint detection systems. Once executed, it fetches additional payloads from remote servers, establishing command and control (C2) communications via Yandex Cloud infrastructure, a legitimate cloud service abused to mask malicious traffic. The payloads include powerful open-source malware variants such as Apfell and Mythic agents, which enable advanced capabilities like reverse SSH tunnels (T1102 technique) for persistent remote access and control. The infection compromises the confidentiality, integrity, and availability of affected systems, effectively granting attackers full control. The attack underscores the rapid propagation potential of supply chain threats in open source environments and the inherent risks of executing npm install commands without stringent security controls. No CVSS score is provided, but the threat's complexity, stealth, and broad platform targeting indicate a high severity level.

Potential Impact

This threat poses significant risks to organizations worldwide, especially those relying on npm packages for software development and deployment. The automatic execution of malicious code during installation can lead to widespread compromise of developer workstations, build servers, and production environments. Attackers gain persistent remote access, enabling data exfiltration, intellectual property theft, lateral movement, and deployment of additional malware. The use of legitimate cloud infrastructure for C2 complicates detection and response efforts. Supply chain compromise undermines trust in open source ecosystems and can disrupt software supply chains, causing operational and reputational damage. Organizations may face costly incident response, potential regulatory penalties, and erosion of customer trust. The cross-platform nature of the malware increases the scope of affected systems, amplifying the potential impact across diverse IT environments.

Mitigation Recommendations

1. Implement strict controls on npm package usage: enforce policies to vet and approve third-party packages before use. 2. Disable or restrict npm lifecycle scripts execution, especially preinstall scripts, in development and CI/CD environments. 3. Employ software composition analysis (SCA) tools to detect malicious or suspicious packages proactively. 4. Monitor network traffic for connections to known malicious domains such as 'x-ya.ru' and 'function.yandexcloud.ru' and block them at the firewall or proxy level. 5. Use endpoint detection and response (EDR) solutions capable of detecting unusual script execution and lateral movement behaviors. 6. Conduct regular audits of installed npm packages and remove any unapproved or suspicious dependencies. 7. Educate developers and DevOps teams about supply chain risks and safe package management practices. 8. Implement network segmentation to limit the blast radius of compromised developer machines. 9. Maintain up-to-date backups and incident response plans to quickly recover from compromises. 10. Leverage threat intelligence feeds to stay informed about emerging malicious packages and indicators of compromise (IOCs).

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.tenable.com/blog/cybersecurity-research-faq-new-malicious-npm-package-ambar-src"]
Adversary
null
Pulse Id
69a161489d57df80623a8b5c
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash4a3e7683e0864a04fd34e818709d176b
hash8d65244501aeaf8b5bfd05b3e52d156e
hash9a8c2a83f66f49b88e36d28894a34009
hashb0c20b80369f2fe984b478b911b59a19
hashf8ca2c8d74f0785c549f09c36147cd0e
hashfc108967f5b1ff6ae35cd201b88a62a6
hash40db994eb2868b325922bf9afcb9bc63bea5e2ea
hasha2e08d4f1d0189f29b8f4582643ba74e00c72e81
hashb87ed18ed62fd638d57729d27fbb58eb87a1848b
hashd6297ff0e5dc114081e0b900e0ebb72bbe1af680
hash1e6fa5021db4dd40b571cc4e654a71c22d0f607d13fb8a4a5a46a64060f3071e
hash492f2366ece5c544a4062da14da5883bc825d6f2bc58cda975799dca9f85b150
hash521ade4aeb95039e1712f8284eba333199fc819f1e0f9db41d6bc9849b131109
hash83e131a2761d6f3a5636cf329182242a927a618174dd440989dc9286be4edeac
hash8963568963f770e237bff2b228106e4ce7ebb0a1af0e0cf7b26028bdc8515bc5
hash9b76e275d989ebc3b43911a5e1d2b64ef9544a6b1dbc69a3412bd0ccadaed567

Domain

ValueDescriptionCopy
domainx-ya.ru
domainfunction.yandexcloud.ru

Threat ID: 69a16a0332ffcdb8a2171d2a

Added to database: 2/27/2026, 9:55:15 AM

Last enriched: 2/27/2026, 10:14:58 AM

Last updated: 2/28/2026, 6:10:59 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses