NPM Nightmare: Malicious Packages Turn Trusted Code into Trojan Horses

Cybersecurity researchers have found two sneaky npm packages, ethers-provider2 and ethers-providerz, designed to infect the popular ethers library. Despite low downloads, these malicious packages cleverly hide their payloads and persist on systems, even if removed. Beware, as uninstalling them won’t fully cleanse your machine of their mischief!

Pro Dashboard

Hot Take:

Looks like malware authors have taken a page out of the Trojan Horse playbook, except they’ve upgraded to the digital version. Who knew that open-source could be such an open invitation for cyber baddies? Get ready to patch up your npm packages, folks—because these cyber gremlins are not playing around!

Key Points:

  • Two malicious npm packages, ethers-provider2 and ethers-providerz, were discovered targeting open-source software.
  • These packages are designed to infect the legitimate ethers package installed locally with a reverse shell.
  • Removing the rogue packages won’t eliminate the malware, as the infection alters the ethers package directly.
  • Malware includes multiple stages to ensure persistence and reinfection, even if ethers-provider2 is removed.
  • The incident highlights the need for vigilance when downloading from open-source repositories.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?