Malware & RansomwareHIGH

Malware - Glassworm Targets Popular React Native Packages

🎯

Basically, hackers secretly added malware to popular coding tools to steal passwords and cryptocurrency.

Quick Summary

A serious supply chain attack has hit popular React Native packages, allowing hackers to steal credentials and cryptocurrency. Developers are at risk, especially those using the affected packages. Immediate action is required to secure systems and prevent further theft.

What Happened

On March 16, 2026, a coordinated supply chain attack rocked the developer community. A threat actor known as Glassworm backdoored two widely used React Native npm packages: react-native-country-select@0.3.91 and react-native-international-phone-number@0.11.8. These packages, published by the same publisher, AstrOOnauta, had been trusted by developers, accounting for over 134,887 downloads in the month prior to the attack. The malicious packages transformed into silent credential and cryptocurrency stealers, making them a serious threat to developers and their projects.

The attack was cunningly executed. Developers running a standard npm install command unknowingly triggered the malware. This was due to the introduction of a new preinstall hook that executed a heavily obfuscated JavaScript file called install.js, making the infection nearly invisible. The malicious behavior was introduced deliberately, suggesting a targeted modification rather than an accidental build mistake.

Who's Affected

The impact of this attack is widespread. Any developer who used the affected packages for mobile applications involving phone number input or country selection is at risk. With 29,763 downloads occurring in the week of the attack alone, many projects that pulled these packages as indirect dependencies are also vulnerable. This means that even developers who did not directly install the malicious packages could still face serious security issues.

The packages were published just three days after clean versions were released, indicating a well-planned attack. The scale of potential exposure is alarming, as many developers may not realize their systems have been compromised until it's too late.

Signs of Infection

Once the install.js script executed, it initiated a multi-stage infection process. The malware first scanned for Russian language markers and timezone offsets. If these indicators were present, the malware ceased operation, a tactic often employed by Russian-speaking threat actors. If the checks cleared, the malware proceeded to query a Solana blockchain account to retrieve further instructions, using a public blockchain account as a delivery relay to avoid detection.

The final payload was a complete Windows-focused stealer that targeted various cryptocurrency wallets and npm tokens. This included wallet data from popular services like MetaMask and Trust Wallet, as well as GitHub credentials. The stealthy nature of the attack makes it particularly dangerous, as many developers may not notice any unusual activity until it is too late.

How to Protect Yourself

Developers are urged to take immediate action. First, audit lock files for the affected versions of the packages. If either react-native-country-select@0.3.91 or react-native-international-phone-number@0.11.8 was installed, treat the machine as compromised. Rotate all npm tokens, GitHub credentials, and cryptocurrency wallet keys that were accessible on affected systems.

Additionally, review outbound network logs for connections to suspicious IP addresses linked to the attack. It's crucial to audit package lifecycle scripts and flag any unexpected preinstall hooks in build environments to reduce exposure to similar supply chain attacks in the future. By staying vigilant and proactive, developers can better protect their projects from malicious threats like Glassworm.

🔒 Pro insight: The use of obfuscated scripts and blockchain for command delivery highlights a sophisticated approach to evade detection in supply chain attacks.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHMalware & Ransomware

Ransomware - Google Warns of Shifting Tactics and Data Theft

Ransomware actors are changing their tactics as profits decline. Google warns that data theft is on the rise, impacting many organizations. It's crucial to adapt security measures to counter these evolving threats.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Android OS Attack Bypasses Mobile Payment Security

A new Android attack technique is hijacking payment apps and bypassing security. Users are at risk of unauthorized transactions and fraud. Experts recommend stronger verification methods to combat this threat.

Infosecurity Magazine·
HIGHMalware & Ransomware

Warlock Ransomware - New Post-Exploitation Techniques Revealed

The Warlock Ransomware Group has ramped up its tactics with new post-exploitation techniques. This poses a serious threat to organizations, especially those with weak security. Awareness and proactive measures are crucial to combat these evolving threats.

Dark Reading·
HIGHMalware & Ransomware

RondoDox Botnet - Expands Targets to 174 Vulnerabilities

RondoDox botnet is ramping up attacks, targeting 174 vulnerabilities with 15,000 daily exploit attempts. This surge poses significant risks to various devices globally. Organizations must act quickly to defend against these threats.

Security Affairs·
HIGHMalware & Ransomware

LeakNet Ransomware - New ClickFix Tactics Uncovered

LeakNet ransomware is using ClickFix tactics via hacked sites to trick users into running harmful commands. This new strategy broadens their reach, putting many at risk. Stay informed and protect your systems against these evolving threats.

The Hacker News·
HIGHMalware & Ransomware

Malware - Attackers Use SEO Poisoning to Steal VPN Credentials

Storm-2561 is stealing VPN credentials through SEO poisoning. This attack targets enterprise employees searching for VPN tools, leading them to fake software. The implications are serious, as stolen credentials can enable unauthorized access to corporate networks.

Cyber Security News·