NPM Nightmare: Stealthy Malware Sneaks Through Popular Packages!
In the latest cyber plot twist, two malicious npm packages, ethers-provider2 and ethers-providerz, have taken reverse shells to a new level of sneakiness. Researchers at ReversingLabs discovered these packages sneaking into development environments, proving once again that even in the tech world, persistence and stealth are the ultimate frenemy goals.

Hot Take:
Looks like npm has turned into a hacker’s playground, where malicious packages are playing hide-and-seek with developers’ sanity. Remember folks, in the world of coding, not all packages come wrapped in a pretty bow! So, keep your guard up, because these cyber Grinches are sneaking in through your dependencies, and they’re not bringing any holiday cheer.
Key Points:
- Malicious npm packages “ethers-provider2” and “ethers-providerz” have been discovered by ReversingLabs.
- The campaign uses reverse shells to maintain a connection with the attacker’s server.
- “Ethers-provider2” mimics legitimate packages, embedding malicious code within installation scripts.
- Even after removal, the malicious modifications can persist if legitimate packages are reinstalled.
- ReversingLabs warns of the high risk of such supply chain attacks and has developed a YARA rule for detection.
Already a member? Log in here