Three npm Packages Opened Remote-Access Shells on Linux and Windows Systems

“Three JavaScript packages have been removed from the npm portal on Thursday for containing malicious code,” reports ZDNet. “According to advisories from the npm security team, the three JavaScript libraries opened shells on the computers of developers who imported the packages into their projects.” The shells, a technical term used by cyber-security researchers, allowed threat actors to connect remotely to the infected computer and execute malicious operations. The npm security team said the shells could work on both Windows and *nix operating systems, such as Linux, FreeBSD, OpenBSD, and others. All three packages were uploaded on the npm portal in May (first) and September 2018 (last two). Each package had hundreds of downloads since being uploaded on the npm portal. The packages names were: plutov-slack-client nodetest199 nodetest1010 “Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer,” the npm security team said.

Read more of this story at Slashdot.

Source:
https://it.slashdot.org/story/20/10/18/2321208/three-npm-packages-opened-remote-access-shells-on-linux-and-windows-systems?utm_source=rss1.0mainlinkanon&utm_medium=feed