Token Farming Fiasco: npm Registry Flooded with 150,000 Malicious Packages!
In a twist on supply chain attacks, the npm registry faced a token farming campaign that didn’t steal secrets but flooded the platform with over 150,000 malicious packages. This cunning scheme rewarded attackers with cryptocurrency, making it rain TEA tokens while developers unknowingly added to the loot.

Hot Take:
Oh, npm, you thought you were just a cozy neighborhood for developers, but now you’re the latest hotspot for crypto-hunters! Move over, bank heists, the new-age robbers are here with their digital shovels, digging for tokens in the npm mine. And guess what? They don’t even need to wear masks or drive getaway cars. Just a line of code and a dream, baby!
Key Points:
- Amazon describes the npm registry attack as one of the largest package flooding incidents in open source history.
- Researchers identified over 150,000 malicious packages linked to a token farming campaign.
- The campaign did not use traditional malware but instead targeted cryptocurrency rewards.
- Fake packages consumed valuable registry resources and could undermine trust in open source systems.
- Amazon and OpenSSF collaborated to respond and protect the supply chain.
Already a member? Log in here
