NPM Nightmare: Malicious Packages Turn Trusted Code into Trojan Horses
Cybersecurity researchers have found two sneaky npm packages, ethers-provider2 and ethers-providerz, designed to infect the popular ethers library. Despite low downloads, these malicious packages cleverly hide their payloads and persist on systems, even if removed. Beware, as uninstalling them won’t fully cleanse your machine of their mischief!

Hot Take:
Looks like malware authors have taken a page out of the Trojan Horse playbook, except they’ve upgraded to the digital version. Who knew that open-source could be such an open invitation for cyber baddies? Get ready to patch up your npm packages, folks—because these cyber gremlins are not playing around!
Key Points:
- Two malicious npm packages, ethers-provider2 and ethers-providerz, were discovered targeting open-source software.
- These packages are designed to infect the legitimate ethers package installed locally with a reverse shell.
- Removing the rogue packages won’t eliminate the malware, as the infection alters the ethers package directly.
- Malware includes multiple stages to ensure persistence and reinfection, even if ethers-provider2 is removed.
- The incident highlights the need for vigilance when downloading from open-source repositories.
Already a member? Log in here