Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack

0
Medium
Vulnerability
Published: Thu Nov 13 2025 (11/13/2025, 04:58:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with thousands of fake packages since early 2024 as part of a likely financially motivated effort. "The packages were systematically published over an extended period, flooding the npm registry with junk packages that survived in the ecosystem for almost two years," Endor Labs

AI-Powered Analysis

AILast updated: 11/13/2025, 06:23:03 UTC

Technical Analysis

Since early 2024, a coordinated spam campaign has systematically flooded the npm registry with over 46,000 fake packages, collectively known as IndonesianFoods. These packages masquerade as legitimate Next.js projects and contain a single JavaScript file (e.g., "auto.js" or "publishScript.js") that remains dormant until manually executed by a user. This design evades detection by automated security scanners that monitor lifecycle hooks or installation-time behaviors. When run, the script enters an infinite loop that removes the "private": true flag from package.json to allow publication, generates a random package name and version, and publishes a new junk package every 7 to 10 seconds. This worm-like self-replicating mechanism has persisted for nearly two years, with packages referencing each other as dependencies, creating an exponentially growing dependency tree that strains npm registry bandwidth and infrastructure. The campaign’s motivation appears financial, as some packages include tea.yaml files linked to the Tea protocol, a decentralized developer reward system, suggesting attackers inflate their impact scores to earn tokens. Despite the scale, the attack does not involve credential theft or direct code injection into developer environments. The campaign exploits npm’s open publishing model and highlights a security blind spot where dormant malicious code evades detection until manually triggered. GitHub has removed the malicious packages and is enhancing detection capabilities, but the incident underscores the challenges in securing large open-source ecosystems against automated, large-scale abuse.

Potential Impact

For European organizations, this campaign poses significant supply chain risks. Developers may inadvertently install these fake packages, leading to polluted dependency trees that degrade software quality and increase build times. The exponential dependency fetching caused by interlinked spam packages can strain internal CI/CD pipelines and npm registry bandwidth, potentially causing delays and outages. Although the packages do not automatically execute malicious code, manual execution—whether accidental or due to misleading documentation—could trigger the worm’s propagation, further exacerbating the problem. The campaign also wastes infrastructure resources and pollutes npm search results, complicating package discovery and increasing the risk of integrating untrusted code. Financially motivated abuse of the Tea protocol could distort open-source contribution metrics, affecting reputation and funding models. European software supply chains heavily reliant on npm, especially in countries with large developer communities and tech industries, face operational disruptions and increased security monitoring burdens. The attack highlights the need for improved vetting and monitoring of open-source dependencies to maintain software integrity and availability.

Mitigation Recommendations

European organizations should implement advanced package vetting processes that include manual and automated analysis of package contents beyond installation scripts, focusing on dormant scripts requiring manual execution. CI/CD pipelines should avoid wildcard execution of JavaScript files (e.g., avoid commands like 'node *.js') to prevent accidental triggering of malicious scripts. Security teams should monitor dependency trees for unusual or rapidly proliferating packages, especially those with suspicious naming patterns or interdependencies. Employing internal mirrors or proxies for npm packages can help control and audit external dependencies before integration. Organizations should collaborate with npm and GitHub to report suspicious packages and stay updated on threat intelligence related to supply chain attacks. Enhancing developer awareness about the risks of running arbitrary scripts from packages and scrutinizing README instructions is critical. Finally, security tooling should evolve to detect dormant malicious code patterns and worm-like propagation behaviors, incorporating behavioral analytics and anomaly detection to identify large-scale spam campaigns early.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/11/over-46000-fake-npm-packages-flood.html","fetched":true,"fetchedAt":"2025-11-13T06:22:45.986Z","wordCount":1720}

Threat ID: 691579379e485ce1c4d84262

Added to database: 11/13/2025, 6:22:47 AM

Last enriched: 11/13/2025, 6:23:03 AM

Last updated: 11/13/2025, 7:29:17 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats