Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

PhantomRaven Wave 5: New Undocumented NPM Supply Chain Campaign Targets DeFi, Cloud, and AI Developers

0
Medium
Published: Mon May 04 2026 (05/04/2026, 14:27:41 UTC)
Source: AlienVault OTX General

Description

PhantomRaven Wave 5 is a supply chain attack campaign targeting NPM packages used by DeFi, cloud, and AI developers. It uses 33 new malicious packages and a three-stage payload delivery mechanism leveraging Remote Dynamic Dependency techniques to evade static analysis. The malicious packages reference dependencies hosted on attacker-controlled servers, which deliver droppers that harvest sensitive developer credentials, system information, CI/CD tokens, GitHub repository names, and email addresses from various configurations and environment variables. Collected data is exfiltrated via POST requests to a command-and-control server. The campaign infrastructure shows links to a legitimate Pakistani IT services company domain, indicating possible abuse or compromise. No patch or official remediation guidance is currently available. The campaign is assessed as medium severity based on the available information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/04/2026, 14:51:31 UTC

Technical Analysis

This threat is a fifth wave of the PhantomRaven NPM supply chain attack campaign involving 33 newly identified malicious packages. The attack uses a sophisticated three-stage payload delivery that employs Remote Dynamic Dependency techniques to bypass static analysis tools. The malicious packages self-reference dependencies pointing to attacker-controlled domains (pack.nppacks.com), which deliver droppers designed to harvest developer credentials, system information, CI/CD tokens, GitHub repository names, and email addresses from Git and NPM configurations and environment variables. The stolen data is exfiltrated to a PHP endpoint (mozbra.php) on the command-and-control server. The campaign specifically targets developers in DeFi cryptocurrency, Azure cloud infrastructure, and AI application domains. Infrastructure analysis reveals connections to a legitimate Pakistani IT services company domain, suggesting potential compromise or misuse. There is no known patch or official fix available, and no known exploits in the wild have been reported.

Potential Impact

The campaign enables attackers to harvest sensitive developer credentials, system information, CI/CD tokens, GitHub repository names, and email addresses, potentially leading to further compromise of development environments, source code repositories, and cloud infrastructure. This can facilitate unauthorized access, code manipulation, and data exfiltration in targeted sectors such as DeFi, cloud, and AI development. The use of Remote Dynamic Dependency techniques allows the attack to evade static analysis detection, increasing the risk of undetected compromise.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or patch links are provided, organizations should monitor for updates from trusted sources and consider auditing their NPM dependencies for suspicious packages, especially those referencing pack.nppacks.com or related domains. Developers should verify the integrity of packages before use and avoid installing undocumented or untrusted NPM packages. Employing runtime monitoring for unusual network activity to domains like pack.nppacks.com and hblnew.ecompk.com may help detect exploitation attempts. No vendor advisory indicates 'no action required' or 'already mitigated,' so proactive defensive measures are recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.mend.io/blog/phantomraven-wave-5-new-undocumented-npm-supply-chain-campaign-targets-defi-cloud-and-ai-developers/"]
Adversary
PhantomRaven
Pulse Id
69f8acdd6038448e350edbb9
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainconsole.info
domainpack.nppacks.com
domainhblnew.ecompk.com
domainecompk.com
domainhblv2.ecompk.com
domainpkg.author.email

Cve

ValueDescriptionCopy
cveCVE-2026-31431

Hash

ValueDescriptionCopy
hash4bdb7aef96dc04c250cceefa222d7d1a
hash83088e7cb00cf9fab74df2f64b7021b2deef6610
hash0ce9b82d290004031b7cc49d724c00011811e1753a283a93a380a311360cfb66
hash78937711bbc74542d304c7a7ea451465a2342438116fb37aa715ccf89b027d04
hashabe9ee9edfc44f7675400207a826c260b2f197d1f93e36010c35d627983e4294

Url

ValueDescriptionCopy
urlhttp://hblnew.ecompk.com/npm/local-rules
urlhttp://pack.nppacks.com/mozbra.php
urlhttp://pack.nppacks.com/npm/
urlhttp://pack.nppacks.com/npm/graphql-js-client-transform
urlhttp://pack.nppacks.com/npm/idle-style-xi
urlhttp://pack.nppacks.com/npm/local-rules
urlhttp://pack.nppacks.com/route.js
urlhttp://pack.nppacks.com/token.php

Threat ID: 69f8af02cbff5d86102ac390

Added to database: 5/4/2026, 2:36:50 PM

Last enriched: 5/4/2026, 2:51:31 PM

Last updated: 5/4/2026, 5:03:18 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses