PhantomRaven Wave 5: New Undocumented NPM Supply Chain Campaign Targets DeFi, Cloud, and AI Developers
PhantomRaven Wave 5 is a supply chain attack campaign targeting NPM packages used by DeFi, cloud, and AI developers. It uses 33 new malicious packages and a three-stage payload delivery mechanism leveraging Remote Dynamic Dependency techniques to evade static analysis. The malicious packages reference dependencies hosted on attacker-controlled servers, which deliver droppers that harvest sensitive developer credentials, system information, CI/CD tokens, GitHub repository names, and email addresses from various configurations and environment variables. Collected data is exfiltrated via POST requests to a command-and-control server. The campaign infrastructure shows links to a legitimate Pakistani IT services company domain, indicating possible abuse or compromise. No patch or official remediation guidance is currently available. The campaign is assessed as medium severity based on the available information.
AI Analysis
Technical Summary
This threat is a fifth wave of the PhantomRaven NPM supply chain attack campaign involving 33 newly identified malicious packages. The attack uses a sophisticated three-stage payload delivery that employs Remote Dynamic Dependency techniques to bypass static analysis tools. The malicious packages self-reference dependencies pointing to attacker-controlled domains (pack.nppacks.com), which deliver droppers designed to harvest developer credentials, system information, CI/CD tokens, GitHub repository names, and email addresses from Git and NPM configurations and environment variables. The stolen data is exfiltrated to a PHP endpoint (mozbra.php) on the command-and-control server. The campaign specifically targets developers in DeFi cryptocurrency, Azure cloud infrastructure, and AI application domains. Infrastructure analysis reveals connections to a legitimate Pakistani IT services company domain, suggesting potential compromise or misuse. There is no known patch or official fix available, and no known exploits in the wild have been reported.
Potential Impact
The campaign enables attackers to harvest sensitive developer credentials, system information, CI/CD tokens, GitHub repository names, and email addresses, potentially leading to further compromise of development environments, source code repositories, and cloud infrastructure. This can facilitate unauthorized access, code manipulation, and data exfiltration in targeted sectors such as DeFi, cloud, and AI development. The use of Remote Dynamic Dependency techniques allows the attack to evade static analysis detection, increasing the risk of undetected compromise.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or patch links are provided, organizations should monitor for updates from trusted sources and consider auditing their NPM dependencies for suspicious packages, especially those referencing pack.nppacks.com or related domains. Developers should verify the integrity of packages before use and avoid installing undocumented or untrusted NPM packages. Employing runtime monitoring for unusual network activity to domains like pack.nppacks.com and hblnew.ecompk.com may help detect exploitation attempts. No vendor advisory indicates 'no action required' or 'already mitigated,' so proactive defensive measures are recommended.
Indicators of Compromise
- domain: console.info
- cve: CVE-2026-31431
- domain: pack.nppacks.com
- domain: hblnew.ecompk.com
- hash: 4bdb7aef96dc04c250cceefa222d7d1a
- hash: 83088e7cb00cf9fab74df2f64b7021b2deef6610
- hash: 0ce9b82d290004031b7cc49d724c00011811e1753a283a93a380a311360cfb66
- hash: 78937711bbc74542d304c7a7ea451465a2342438116fb37aa715ccf89b027d04
- hash: abe9ee9edfc44f7675400207a826c260b2f197d1f93e36010c35d627983e4294
- url: http://hblnew.ecompk.com/npm/local-rules
- url: http://pack.nppacks.com/mozbra.php
- url: http://pack.nppacks.com/npm/
- url: http://pack.nppacks.com/npm/graphql-js-client-transform
- url: http://pack.nppacks.com/npm/idle-style-xi
- url: http://pack.nppacks.com/npm/local-rules
- url: http://pack.nppacks.com/route.js
- url: http://pack.nppacks.com/token.php
- domain: ecompk.com
- domain: hblv2.ecompk.com
- domain: pkg.author.email
PhantomRaven Wave 5: New Undocumented NPM Supply Chain Campaign Targets DeFi, Cloud, and AI Developers
Description
PhantomRaven Wave 5 is a supply chain attack campaign targeting NPM packages used by DeFi, cloud, and AI developers. It uses 33 new malicious packages and a three-stage payload delivery mechanism leveraging Remote Dynamic Dependency techniques to evade static analysis. The malicious packages reference dependencies hosted on attacker-controlled servers, which deliver droppers that harvest sensitive developer credentials, system information, CI/CD tokens, GitHub repository names, and email addresses from various configurations and environment variables. Collected data is exfiltrated via POST requests to a command-and-control server. The campaign infrastructure shows links to a legitimate Pakistani IT services company domain, indicating possible abuse or compromise. No patch or official remediation guidance is currently available. The campaign is assessed as medium severity based on the available information.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat is a fifth wave of the PhantomRaven NPM supply chain attack campaign involving 33 newly identified malicious packages. The attack uses a sophisticated three-stage payload delivery that employs Remote Dynamic Dependency techniques to bypass static analysis tools. The malicious packages self-reference dependencies pointing to attacker-controlled domains (pack.nppacks.com), which deliver droppers designed to harvest developer credentials, system information, CI/CD tokens, GitHub repository names, and email addresses from Git and NPM configurations and environment variables. The stolen data is exfiltrated to a PHP endpoint (mozbra.php) on the command-and-control server. The campaign specifically targets developers in DeFi cryptocurrency, Azure cloud infrastructure, and AI application domains. Infrastructure analysis reveals connections to a legitimate Pakistani IT services company domain, suggesting potential compromise or misuse. There is no known patch or official fix available, and no known exploits in the wild have been reported.
Potential Impact
The campaign enables attackers to harvest sensitive developer credentials, system information, CI/CD tokens, GitHub repository names, and email addresses, potentially leading to further compromise of development environments, source code repositories, and cloud infrastructure. This can facilitate unauthorized access, code manipulation, and data exfiltration in targeted sectors such as DeFi, cloud, and AI development. The use of Remote Dynamic Dependency techniques allows the attack to evade static analysis detection, increasing the risk of undetected compromise.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no official fix or patch links are provided, organizations should monitor for updates from trusted sources and consider auditing their NPM dependencies for suspicious packages, especially those referencing pack.nppacks.com or related domains. Developers should verify the integrity of packages before use and avoid installing undocumented or untrusted NPM packages. Employing runtime monitoring for unusual network activity to domains like pack.nppacks.com and hblnew.ecompk.com may help detect exploitation attempts. No vendor advisory indicates 'no action required' or 'already mitigated,' so proactive defensive measures are recommended.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.mend.io/blog/phantomraven-wave-5-new-undocumented-npm-supply-chain-campaign-targets-defi-cloud-and-ai-developers/"]
- Adversary
- PhantomRaven
- Pulse Id
- 69f8acdd6038448e350edbb9
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domainconsole.info | — | |
domainpack.nppacks.com | — | |
domainhblnew.ecompk.com | — | |
domainecompk.com | — | |
domainhblv2.ecompk.com | — | |
domainpkg.author.email | — |
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2026-31431 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash4bdb7aef96dc04c250cceefa222d7d1a | — | |
hash83088e7cb00cf9fab74df2f64b7021b2deef6610 | — | |
hash0ce9b82d290004031b7cc49d724c00011811e1753a283a93a380a311360cfb66 | — | |
hash78937711bbc74542d304c7a7ea451465a2342438116fb37aa715ccf89b027d04 | — | |
hashabe9ee9edfc44f7675400207a826c260b2f197d1f93e36010c35d627983e4294 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://hblnew.ecompk.com/npm/local-rules | — | |
urlhttp://pack.nppacks.com/mozbra.php | — | |
urlhttp://pack.nppacks.com/npm/ | — | |
urlhttp://pack.nppacks.com/npm/graphql-js-client-transform | — | |
urlhttp://pack.nppacks.com/npm/idle-style-xi | — | |
urlhttp://pack.nppacks.com/npm/local-rules | — | |
urlhttp://pack.nppacks.com/route.js | — | |
urlhttp://pack.nppacks.com/token.php | — |
Threat ID: 69f8af02cbff5d86102ac390
Added to database: 5/4/2026, 2:36:50 PM
Last enriched: 5/4/2026, 2:51:31 PM
Last updated: 5/4/2026, 5:03:18 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.