Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack
Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with thousands of fake packages since early 2024 as part of a likely financially motivated effort. "The packages were systematically published over an extended period, flooding the npm registry with junk packages that survived in the ecosystem for almost two years," Endor Labs
AI Analysis
Technical Summary
Since early 2024, a coordinated spam campaign has systematically flooded the npm registry with over 46,000 fake packages, collectively known as IndonesianFoods. These packages masquerade as legitimate Next.js projects and contain a single JavaScript file (e.g., "auto.js" or "publishScript.js") that remains dormant until manually executed by a user. This design evades detection by automated security scanners that monitor lifecycle hooks or installation-time behaviors. When run, the script enters an infinite loop that removes the "private": true flag from package.json to allow publication, generates a random package name and version, and publishes a new junk package every 7 to 10 seconds. This worm-like self-replicating mechanism has persisted for nearly two years, with packages referencing each other as dependencies, creating an exponentially growing dependency tree that strains npm registry bandwidth and infrastructure. The campaign’s motivation appears financial, as some packages include tea.yaml files linked to the Tea protocol, a decentralized developer reward system, suggesting attackers inflate their impact scores to earn tokens. Despite the scale, the attack does not involve credential theft or direct code injection into developer environments. The campaign exploits npm’s open publishing model and highlights a security blind spot where dormant malicious code evades detection until manually triggered. GitHub has removed the malicious packages and is enhancing detection capabilities, but the incident underscores the challenges in securing large open-source ecosystems against automated, large-scale abuse.
Potential Impact
For European organizations, this campaign poses significant supply chain risks. Developers may inadvertently install these fake packages, leading to polluted dependency trees that degrade software quality and increase build times. The exponential dependency fetching caused by interlinked spam packages can strain internal CI/CD pipelines and npm registry bandwidth, potentially causing delays and outages. Although the packages do not automatically execute malicious code, manual execution—whether accidental or due to misleading documentation—could trigger the worm’s propagation, further exacerbating the problem. The campaign also wastes infrastructure resources and pollutes npm search results, complicating package discovery and increasing the risk of integrating untrusted code. Financially motivated abuse of the Tea protocol could distort open-source contribution metrics, affecting reputation and funding models. European software supply chains heavily reliant on npm, especially in countries with large developer communities and tech industries, face operational disruptions and increased security monitoring burdens. The attack highlights the need for improved vetting and monitoring of open-source dependencies to maintain software integrity and availability.
Mitigation Recommendations
European organizations should implement advanced package vetting processes that include manual and automated analysis of package contents beyond installation scripts, focusing on dormant scripts requiring manual execution. CI/CD pipelines should avoid wildcard execution of JavaScript files (e.g., avoid commands like 'node *.js') to prevent accidental triggering of malicious scripts. Security teams should monitor dependency trees for unusual or rapidly proliferating packages, especially those with suspicious naming patterns or interdependencies. Employing internal mirrors or proxies for npm packages can help control and audit external dependencies before integration. Organizations should collaborate with npm and GitHub to report suspicious packages and stay updated on threat intelligence related to supply chain attacks. Enhancing developer awareness about the risks of running arbitrary scripts from packages and scrutinizing README instructions is critical. Finally, security tooling should evolve to detect dormant malicious code patterns and worm-like propagation behaviors, incorporating behavioral analytics and anomaly detection to identify large-scale spam campaigns early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Poland, Italy, Spain, Sweden
Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack
Description
Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with thousands of fake packages since early 2024 as part of a likely financially motivated effort. "The packages were systematically published over an extended period, flooding the npm registry with junk packages that survived in the ecosystem for almost two years," Endor Labs
AI-Powered Analysis
Technical Analysis
Since early 2024, a coordinated spam campaign has systematically flooded the npm registry with over 46,000 fake packages, collectively known as IndonesianFoods. These packages masquerade as legitimate Next.js projects and contain a single JavaScript file (e.g., "auto.js" or "publishScript.js") that remains dormant until manually executed by a user. This design evades detection by automated security scanners that monitor lifecycle hooks or installation-time behaviors. When run, the script enters an infinite loop that removes the "private": true flag from package.json to allow publication, generates a random package name and version, and publishes a new junk package every 7 to 10 seconds. This worm-like self-replicating mechanism has persisted for nearly two years, with packages referencing each other as dependencies, creating an exponentially growing dependency tree that strains npm registry bandwidth and infrastructure. The campaign’s motivation appears financial, as some packages include tea.yaml files linked to the Tea protocol, a decentralized developer reward system, suggesting attackers inflate their impact scores to earn tokens. Despite the scale, the attack does not involve credential theft or direct code injection into developer environments. The campaign exploits npm’s open publishing model and highlights a security blind spot where dormant malicious code evades detection until manually triggered. GitHub has removed the malicious packages and is enhancing detection capabilities, but the incident underscores the challenges in securing large open-source ecosystems against automated, large-scale abuse.
Potential Impact
For European organizations, this campaign poses significant supply chain risks. Developers may inadvertently install these fake packages, leading to polluted dependency trees that degrade software quality and increase build times. The exponential dependency fetching caused by interlinked spam packages can strain internal CI/CD pipelines and npm registry bandwidth, potentially causing delays and outages. Although the packages do not automatically execute malicious code, manual execution—whether accidental or due to misleading documentation—could trigger the worm’s propagation, further exacerbating the problem. The campaign also wastes infrastructure resources and pollutes npm search results, complicating package discovery and increasing the risk of integrating untrusted code. Financially motivated abuse of the Tea protocol could distort open-source contribution metrics, affecting reputation and funding models. European software supply chains heavily reliant on npm, especially in countries with large developer communities and tech industries, face operational disruptions and increased security monitoring burdens. The attack highlights the need for improved vetting and monitoring of open-source dependencies to maintain software integrity and availability.
Mitigation Recommendations
European organizations should implement advanced package vetting processes that include manual and automated analysis of package contents beyond installation scripts, focusing on dormant scripts requiring manual execution. CI/CD pipelines should avoid wildcard execution of JavaScript files (e.g., avoid commands like 'node *.js') to prevent accidental triggering of malicious scripts. Security teams should monitor dependency trees for unusual or rapidly proliferating packages, especially those with suspicious naming patterns or interdependencies. Employing internal mirrors or proxies for npm packages can help control and audit external dependencies before integration. Organizations should collaborate with npm and GitHub to report suspicious packages and stay updated on threat intelligence related to supply chain attacks. Enhancing developer awareness about the risks of running arbitrary scripts from packages and scrutinizing README instructions is critical. Finally, security tooling should evolve to detect dormant malicious code patterns and worm-like propagation behaviors, incorporating behavioral analytics and anomaly detection to identify large-scale spam campaigns early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/11/over-46000-fake-npm-packages-flood.html","fetched":true,"fetchedAt":"2025-11-13T06:22:45.986Z","wordCount":1720}
Threat ID: 691579379e485ce1c4d84262
Added to database: 11/13/2025, 6:22:47 AM
Last enriched: 11/13/2025, 6:23:03 AM
Last updated: 11/13/2025, 7:29:17 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12620: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ays-pro Poll Maker – Versus Polls, Anonymous Polls, Image Polls
MediumCVE-2025-12891: CWE-862 Missing Authorization in ays-pro Survey Maker
MediumCVE-2025-12979: CWE-862 Missing Authorization in uscnanbu Welcart e-Commerce
MediumCVE-2025-12892: CWE-862 Missing Authorization in ays-pro Survey Maker
MediumCVE-2025-12536: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in brainstormforce SureForms – Contact Form, Custom Form Builder, Calculator & More
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.