Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Malicious Npm Packages Used In Phishing

October 13, 2025
Reading Time: 3 mins read
in Alerts
Extortion Group Leaks Salesforce Data

Researchers have uncovered a new and unusual credential harvesting campaign, dubbed Beamglea, that abuses the npm registry and a content delivery network (CDN) to create a robust phishing infrastructure. The campaign uses 175 malicious packages that, while unlikely to be accidentally downloaded by developers due to their randomized names, have collectively been installed around 26,000 times. These packages serve as the foundation for an elaborate phishing scheme targeting over 135 industrial, technology, and energy companies worldwide. This method highlights an evolving threat landscape where attackers are finding new ways to exploit legitimate platforms and services rather than relying on traditional attack vectors.

The threat actors behind Beamglea aren’t using the npm packages to directly infect systems with malware. Instead, they are leveraging the platform’s public registry and the unpkg.com CDN to host redirect scripts. The attackers use a Python script called ‘redirect_generator.py’ to programmatically create and publish these packages, injecting a victim’s email address and a custom phishing URL into each one. Once a package is live, the attackers create a malicious HTML file that references the new package’s URL on the UNPKG CDN. This setup allows them to host their phishing infrastructure for free, making it a highly cost-effective and resilient operation.

When a victim opens one of these specially crafted HTML files, the malicious JavaScript immediately loads from the UNPKG CDN and redirects the user to a credential harvesting page. The script automatically pre-fills the email field with the victim’s address, which was embedded in the package itself. This seemingly legitimate pre-filled login portal is a key component of the attack, as it significantly reduces suspicion and increases the likelihood that a victim will enter their credentials. Researchers found over 630 of these malicious HTML files, disguised as purchase orders, project documents, and other work-related materials.

It’s currently unclear how the attackers are distributing the HTML files, but it’s highly likely they are being spread through phishing emails. Since the packages themselves don’t contain any malicious code that executes upon installation, developers who might inadvertently download one would see no harmful behavior. The real danger lies in how the attackers are using the npm ecosystem and UNPKG to host and distribute their malicious scripts. This novel approach turns the npm registry into a silent, unwitting host for a large-scale phishing operation rather than a direct attack vector.

This campaign serves as a stark reminder of how attackers are constantly adapting their techniques to stay ahead of security defenses. By abusing legitimate, trusted infrastructure on a massive scale, the creators of Beamglea have developed a reproducible playbook that other threat actors are likely to adopt. The low cost and high resilience of this method make it an effective way to launch widespread attacks, reinforcing the need for continuous vigilance and new detection strategies to combat these ever-evolving threats.

Reference:

  • Over 170 Npm Packages With 26000 Downloads Linked To Credential Phishing Campaign
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

Extortion Group Leaks Salesforce Data

Fake Inflation Refund Text Scam Hits NY

October 13, 2025
Extortion Group Leaks Salesforce Data

Rust Malware ChaosBot Exploits Discord

October 13, 2025
BatShadow Unleashes Go Vampire Bot

BatShadow Unleashes Go Vampire Bot

October 10, 2025
BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

October 10, 2025
Redis Use After Free Bug Enables RCE

FileFix Attack Evades Security Tools

October 10, 2025
Hackers Abuse WordPress for Phishing

Hackers Abuse WordPress for Phishing

October 10, 2025

Latest Alerts

Malicious Npm Packages Used In Phishing

Fake Inflation Refund Text Scam Hits NY

Rust Malware ChaosBot Exploits Discord

BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

FileFix Attack Evades Security Tools

Subscribe to our newsletter

    Latest Incidents

    Harvard Probes Breach Tied To Oracle Flaw

    Qilin Ransomware Hits Beer Giant Asahi

    Fortra Reports GoAnywhere MFT Breach

    Crimson Collective Hits AWS Instances

    GitHub Copilot Chat Flaw Leaks Repo Data

    Microsoft 365 Outage Hits Services

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial