Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

PhantomRaven Npm Campaign Hides Bad Code

October 30, 2025
Reading Time: 3 mins read
in Alerts
Windows Cloud Files Minifilter Exploited

Since August 2025, a major supply chain attack against the developer community has been active, culminating in the identification of 126 malicious npm packages that accumulated over 86,000 downloads. This coordinated operation, now known as PhantomRaven, was specifically designed to steal sensitive data, including npm authentication tokens, GitHub credentials, and crucial CI/CD pipeline secrets from developers worldwide. The campaign was notable for its use of highly advanced detection evasion techniques that successfully bypassed most conventional security measures.

Security analysts first identified the PhantomRaven campaign in October 2025. Their behavioral monitoring systems flagged unusual network activity occurring during the package installation process—a key indicator of post-download malicious action. All of the suspicious packages were observed making external network requests to the same external domain, confirming that they were part of a single, orchestrated operation. Although 21 initial packages were detected and quickly removed in August 2025, the attackers rapidly adjusted their tactics, successfully deploying an additional 80 packages between September and October that completely avoided existing detection mechanisms.

The investigation into the threat actor behind PhantomRaven revealed an interesting operational paradox. The attacker’s underlying infrastructure showed surprisingly poor operational security (OpSec), with traceable sequential email accounts and obvious usernames like npmhell. This carelessness clearly traced the technical infrastructure back to a single operator. Despite this, the technical delivery mechanism itself was highly innovative and represented a significant advancement in the sophistication of software supply chain attacks.

This technical novelty stemmed from using Remote Dynamic Dependencies. When reviewed on the npm registry, the malicious packages appeared harmless, displaying only simple “hello world” scripts with no dependencies. This deception was achieved by leveraging an obscure npm feature where HTTP URLs are used as dependency specifiers instead of traditional registry references. The actual malicious code was not present in the package visible on npmjs.com but resided in a hidden dependency that was fetched from an attacker-controlled server (packages.storeartifact.com) at the moment of installation. This technique allowed the payload to completely bypass static analysis and dependency scanning tools.

Once the invisible, malicious dependency arrives on the victim’s system, the attack is executed via npm’s automatic lifecycle script execution. The package.json file contains a preinstall script (e.g., “preinstall”: “node index[.]js”) that runs immediately and automatically, with no user prompt or warning. Crucially, this script executes even if the malicious package is merely a deeply-nested transitive dependency of a seemingly legitimate package. Upon activation, PhantomRaven systematically harvests credentials: it collects email addresses, targets CI/CD credentials (like GitHub Actions, GitLab CI, and npm publishing tokens), and performs a complete system fingerprinting to profile the victim’s environment and identify high-value corporate networks.

Reference:

  • PhantomRaven Uses 126 Malicious Npm Packages With 86000 Downloads Hiding Malware
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

ShadowPad Exploits WSUS Flaw For Access

Windows 11 24H2 Explorer And Start Crash

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

Matrix Push C2 Uses Browser Alerts To Phish

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

ShadowPad Exploits WSUS Flaw For Access

November 24, 2025
Salesforce Breach Hits Over 200 Victims

Sturnus Trojan Steals Android Chats

November 21, 2025
Salesforce Breach Hits Over 200 Victims

Tsundere Botnet Grows via Game Lures

November 21, 2025
APT24 Uses BADAUDIO in Taiwan Spying

APT24 Uses BADAUDIO in Taiwan Spying

November 21, 2025

Latest Alerts

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Sturnus Trojan Steals Android Chats

Tsundere Botnet Grows via Game Lures

APT24 Uses BADAUDIO in Taiwan Spying

Subscribe to our newsletter

    Latest Incidents

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    Over 50000 Asus Routers Compromised

    Salesforce Breach Hits Over 200 Victims

    Almaviva Leak Exposes FS Group Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial