Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

The npm Threat Landscape: Attack Surface and Mitigations

0
Medium
Published: Sat Apr 25 2026 (04/25/2026, 00:01:57 UTC)
Source: AlienVault OTX General

Description

The npm ecosystem experienced a critical shift in September 2025 with the Shai-Hulud worm, marking the transition from isolated attacks to systematic supply chain compromises. In April 2026, TeamPCP launched a coordinated campaign through a malicious @bitwarden/cli package targeting multiple distribution channels including Docker Hub, GitHub Actions, and VS Code extensions. The multi-stage payload employs advanced obfuscation, harvests credentials from cloud providers and developer workstations, exfiltrates data through encrypted HTTPS and GitHub repositories, and self-propagates by backdooring npm packages using stolen tokens. The malware implements GitHub's search API as a resilient command-and-control fallback mechanism and features anti-detection measures including Russian locale killswitches. This represents an evolution toward wormable propagation, infrastructure-level persistence, and dormant payloads that activate under specific conditions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/27/2026, 09:00:15 UTC

Technical Analysis

This threat involves a multi-stage malware campaign targeting the npm supply chain ecosystem. Initially marked by the Shai-Hulud worm in September 2025, the attack evolved into a coordinated campaign by TeamPCP in April 2026 using a malicious @bitwarden/cli package. The malware propagates through multiple developer and CI/CD distribution channels, harvesting credentials and exfiltrating data via encrypted HTTPS and GitHub repositories. It self-replicates by injecting backdoors into npm packages using stolen tokens. The malware leverages GitHub's search API as a resilient fallback for command-and-control and employs anti-detection measures including locale-based killswitches. This campaign demonstrates advanced supply chain compromise techniques with wormable propagation and dormant payload activation under specific conditions. No patch or official remediation is documented, and no confirmed exploits in the wild are reported.

Potential Impact

The malware compromises developer environments and supply chain infrastructure by harvesting credentials from cloud providers and workstations, enabling persistent access and data exfiltration. It can propagate autonomously by backdooring npm packages, potentially affecting multiple downstream projects and users. The use of encrypted communication and fallback C2 mechanisms increases its resilience and stealth. The presence of anti-detection features complicates detection and response efforts. Although no known exploits in the wild are confirmed, the potential impact on software supply chains and developer ecosystems is significant.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Due to the lack of official patches or fixes, organizations should monitor trusted vendor advisories and threat intelligence updates for mitigation recommendations. Focus on verifying the integrity of npm packages, restricting token permissions, and scrutinizing CI/CD pipeline security. Avoid using suspicious or unverified npm packages, especially those related to @bitwarden/cli. Employ threat intelligence indicators such as known malicious domains and hashes to detect potential compromise. No vendor advisory states that no action is required or that the threat is already mitigated.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/","https://unit42.paloaltonetworks.com/wp-content/uploads/2026/04/05_Malware_Category_1920x900.jpg"]
Adversary
TeamPCP
Pulse Id
69ec0475e74facdf3bf89ce1
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainaudit.checkmarx.cx
domaincheckmarx.cx

Hash

ValueDescriptionCopy
hashbc544f455d7c06c8a1f3446160a6d9a4a8236b11
hash167ce57ef59a32a6a0ef4137785828077879092d7f83ddbc1755d6e69116e0ad
hash18f784b3bc9a0bcdcb1a8d7f51bc5f54323fc40cbd874119354ab609bef6e4cb
hashf35475829991b303c5efc2ee0f343dd38f8614e8b5e69db683923135f85cf60d

Url

ValueDescriptionCopy
urlhttp://audit.checkmarx.cx:443

Threat ID: 69ef2218ba26a39fba0e5886

Added to database: 4/27/2026, 8:45:12 AM

Last enriched: 4/27/2026, 9:00:15 AM

Last updated: 4/28/2026, 1:45:10 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses