NPM Package Imposter: How Cybercriminals Attempted to Hack GitHub’s Backyard
Cybersecurity researchers have uncovered a malicious npm package, “@acitons/artifact,” designed to target GitHub-owned repositories by typosquatting the legitimate “@actions/artifact.” This sneaky package aimed to execute during builds, exfiltrate tokens, and publish malicious artifacts. It’s a prankster in the digital world, but with malevolent intentions!

Hot Take:
Looks like someone’s been mixing up their npm packages and GitHub repositories like a chef gone rogue in a spice aisle. Next thing you know, your software soufflé is serving up malware instead of meringue. Better keep those version numbers in check, or you might end up with a side dish of cyber-espionage!
Key Points:
- A malicious npm package, “@acitons/artifact,” is typosquatting the legitimate “@actions/artifact” package.
- The goal is to target GitHub-owned repositories by exfiltrating tokens to publish new malicious artifacts.
- Six versions of the package contained malware, but the latest download version, 4.0.10, appears clean.
- The package was downloaded over 47,000 times, and another similar package, “8jfiesaf83,” was downloaded 1,016 times.
- The attack specifically targets GitHub’s repositories and possibly a mysterious user named y8793hfiuashfjksdhfjsk.
Already a member? Log in here
