Published on: July 26, 2025
By: CyberDudeBivash Editorial Team
In a troubling incident, the very widely used npm utility library is
βdownloaded more than 2.8 million times per weekβwas compromised by malicious actors. The attackers pushed unauthorized versions of the library (versions 3.3.1 through 5.0.0) during a roughly six-hour window in late July 2025. A sophisticated phishing campaign targeting the maintainer led to the credential theft and unauthorized access to npm publishing tools.(turn0news10)The same campaign also impacted eslint-config-prettier and related packages (eslint-plugin-prettier
, synckit
, @pkgr/core
, napi-postinstall
), indicating a broader supply chain breach.
The compromised is
package contained a hidden WebSocket-based backdoor enabling remote code execution on infected systems. The backdoor silently established a connection to an attacker-controlled control server, awaiting commands and enabling full inbound control of affected projects at runtime.(turn0news10)In parallel, the ESLint-based packages deployed Scavanger, a browser infostealer that harvested stored credentials such as cookies and local storage data.
is
library is embedded in countless build tools, CLIs, backend services, and test frameworks. Any environment depending on itβeven transitivelyβis potentially exposed to backdoor execution.is
during dev builds may unknowingly enable malicious behavior in production environments.Audit all projects that reference is
, directly or transitively. Identify if any versions 3.3.1 through 5.0.0 were installed.
Revert to the last known good version (<=β―3.3.0) or upgrade to safe patched releases once available. Review affected versions of ESLint-related packages similarly.
Run scans on build artifacts, CI/CD logs, runtime environments, and production processes for unexpected WebSocket listeners or command execution.
Require 2FA and stronger anti-phishing controls around npm accounts. Ensure maintainers don't have write-only credentials lingering in environments.
Enforce dependency scanning tools (SCA), locking files (package-lock.json
), and allow-listing of allowed package publishers.
Watch for unusual outbound connections from development or CI agents to unrecognized WebSocket endpoints (which may be C&C servers).
This incident underscores the need for treating code dependencies as untrusted infrastructure. Even small utility libraries can become major attack vectors if an attacker gains control.Supply chain attacks now evolve faster than ever. Developers should not blindly trust light-weight packages; visibility, version locking, and dependency hygiene are critical.
Risk Area | Insight |
---|---|
Package | is library compromised in npm supply chain breach |
Malicious Behavior | WebSocket-based remote code execution backdoor |
Scope | Millions of weekly installs; impact in dev and production pipelines |
Affected Packages | is , eslint-config-prettier , eslint-plugin-prettier , synckit , ... |
Mitigations | Dependency audit, forced upgrades, hardened account security, egress control |
is
library or affected packages like ESLint config?Share your experiences in the comments or tweet us at @CyberDudeBivash!
Subscribe to our CyberMagazine for real-time threat alerts, best practices in open-source security, and actionable supply chain defense strategies.Tags: #SupplyChainAttack #npm #JavaScriptSecurity #isLibrary #EslintCompromise #RemoteCodeExecution #Cybersecurity #CyberDudeBivash