Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Malicious npm Packages Deliver Protestware

July 18, 2025
Reading Time: 2 mins read
in Alerts
Malicious npm Packages Deliver Protestware

A sophisticated protestware campaign is actively targeting Russian and Belarusian internet users through a network of compromised npm packages. Threat actors have weaponized at least 28 new packages, containing nearly 2,000 versions of malicious code, to distribute politically motivated malware. This campaign represents a significant escalation in supply chain attacks, leveraging JavaScript package repositories to disrupt user interactions on targeted websites.

The malware operates through a complex conditional framework, specifically activating for users with Russian browser language settings who visit domains with extensions such as .ru, .by, .su, and .рф.

Once these conditions are met, the protestware disables all mouse-based interactions on affected websites and plays the Ukrainian national anthem on a loop, effectively rendering the sites unusable for the targeted demographic.

Socket.dev analysts identified the widespread distribution of this protestware, tracing its origins to unintentional supply chain contamination through the popular SweetAlert2 library. Developers unknowingly copied infected code from SweetAlert2 into their own packages, leading to the malicious code’s propagation across various affected packages, including UI component libraries and specialized development tools. Many of these packages contain over 100,000 lines of code, with the malicious payload strategically hidden deep within the codebase to evade detection during routine code reviews.

To ensure long-term impact and avoid immediate detection, the protestware employs sophisticated persistence tactics. It utilizes browser localStorage to track user visits and implements a three-day delay mechanism before payload activation, establishing persistence without triggering immediate suspicion. The core implementation relies on multi-layered conditional checks, verifying the browser environment, language settings, and targeted domains.

After satisfying all conditions and the three-day timer expires, the malware executes its payload by disabling mouse interactions and playing the Ukrainian national anthem from an external server. The persistence mechanism stores an initiation timestamp in localStorage, calculating the elapsed time since the first visit to ensure repeat users experience the full protestware impact while minimizing collateral damage to casual visitors.

Reference:

  • Threat Actors Weaponize 28+ npm Packages to Infect Developers With Protestware Scripts
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJuly 2025
ADVERTISEMENT

Related Posts

Fake Law Firms Exploit Crypto Victims

Fake Law Firms Exploit Crypto Victims

August 18, 2025
Fake Law Firms Exploit Crypto Victims

Plex Urges Users to Patch Fast

August 18, 2025
Fake Law Firms Exploit Crypto Victims

Man in the Prompt Reveals Hidden AI Threat

August 18, 2025
Charon Ransomware Hits Middle East

Charon Ransomware Hits Middle East

August 15, 2025
Charon Ransomware Hits Middle East

Hackers Use CrossC2 to Target Linux, macOS

August 15, 2025
Charon Ransomware Hits Middle East

Zoom Patches Critical Windows Flaw

August 15, 2025

Latest Alerts

Plex Urges Users to Patch Fast

Man in the Prompt Reveals Hidden AI Threat

Fake Law Firms Exploit Crypto Victims

Zoom Patches Critical Windows Flaw

Charon Ransomware Hits Middle East

Hackers Use CrossC2 to Target Linux, macOS

Subscribe to our newsletter

    Latest Incidents

    Hackers Exploit Microsoft Flaw in Canada

    Colt Hit by Cyberattack Shuts Systems

    Workday Discloses Data Breach

    Hackers Leak Allianz Life Data

    Croatian Institute Hit by Ransomware

    Norway Dam Breached by Pro-Russian Hackers

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial