Malware & RansomwareHIGH

Malware - Malicious npm Packages Deliver PylangGhost RAT

🎯

Basically, bad software hidden in popular coding tools can let hackers into your computer.

Quick Summary

A new remote access trojan, PylangGhost, has infiltrated npm packages, posing a serious risk to developers. This malware, linked to North Korean hackers, could compromise entire organizations. Immediate action is essential to mitigate the threat.

What Happened

A remote access trojan (RAT) named PylangGhost has emerged on the npm registry, hidden within two malicious JavaScript packages. This malware, first reported by Cisco Talos in June 2025, is attributed to the North Korean state-sponsored group FAMOUS CHOLLIMA. Their strategy marks a significant escalation in software supply chain attacks, specifically targeting developers worldwide.

The malicious packages, published by a user named jaime9008, include @jaime9008/math-service and react-refresh-update. They were uploaded in late February and early March 2026, respectively. Both packages have undergone rapid updates, embedding the PylangGhost loader in crucial JavaScript files. This development highlights a calculated effort by FAMOUS CHOLLIMA to compromise development pipelines on a larger scale than ever before.

Who's Being Targeted

Developers who installed these malicious npm packages are at risk of having their systems compromised without any visible signs. The broader implications of this attack extend beyond individual developers, as npm packages are often integrated into large-scale projects and automated build systems. A single infected package can expose entire organizations to significant security threats.

The use of a convincing package name like react-refresh-update makes it easier for the malware to evade detection during routine dependency reviews. This stealthy approach allows the malware to execute its payload without raising suspicion, increasing the potential impact on development environments.

Signs of Infection

Once a developer installs an affected package, the infection chain begins. A JavaScript loader embedded in specific files executes automatically, following a decode-decrypt-evaluate sequence. It uses a hardcoded XOR key to unlock the hidden payload. The loader checks the operating system and adjusts its behavior accordingly.

On Windows machines, for instance, the malware downloads a ZIP archive from a specified domain in small increments to bypass network monitoring tools. This process remains invisible to the user, as it extracts files to the system’s temp directory and launches a VBScript file without user intervention. On macOS and Linux, a shell script is fetched and executed directly, further complicating detection efforts.

How to Protect Yourself

Developers and security teams must take immediate action to mitigate the risks associated with these malicious packages. They should audit their npm dependency trees for react-refresh-update and @jaime9008/math-service, removing any instances found. Additionally, blocking all network traffic to the command-and-control server at malicanbur[.]pro is crucial.

Integrating software composition analysis tools into build and deployment pipelines can help identify compromised packages before they reach production. Any unexpected network connections during package installation should be treated as a serious incident, warranting thorough investigation and remediation. By staying vigilant and proactive, developers can protect their systems and organizations from this sophisticated malware campaign.

🔒 Pro insight: The use of npm for malware distribution reflects a growing trend in supply chain attacks, necessitating enhanced vigilance among developers.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHMalware & Ransomware

Malware - Konni Uses Phishing to Deploy EndRAT via KakaoTalk

North Korean hackers are using phishing emails to deploy EndRAT malware. Victims' KakaoTalk accounts are compromised to spread the attack further. This poses a significant risk to sensitive information and trust among contacts. Stay vigilant against suspicious emails and messages.

The Hacker News·
HIGHMalware & Ransomware

Payload Ransomware - New Threat Uses Babuk-Style Encryption

A new ransomware called Payload is wreaking havoc across sectors. It targets mid-to-large organizations, stealing and encrypting critical data. With advanced techniques, the risk of data loss is significant. Organizations must take immediate action to protect themselves.

Cyber Security News·
HIGHMalware & Ransomware

Malware - ClickFix Attacks Evolve with ChatGPT Lures

ClickFix attacks are evolving, now targeting macOS users with sophisticated infostealers like MacSync. These tactics exploit user trust, bypassing security measures. Stay alert to protect your data!

Security Affairs·
HIGHMalware & Ransomware

Malware - New CondiBot Variant and Monaco Cryptominer Threaten

New malware strains, CondiBot and Monaco, are targeting network devices, posing significant risks to enterprises. Their multi-architecture designs allow for widespread exploitation. Organizations must act swiftly to protect their infrastructure.

Cyber Security News·
HIGHMalware & Ransomware

Keylogger - Understanding This Old-School Malware Threat

Keyloggers are still a serious threat in cybercrime today. They capture sensitive data like passwords and financial information. Understanding how they work can help you protect yourself.

CSO Online·
HIGHMalware & Ransomware

Malware - New ClickFix Attack Uses WorkFlowy for Delivery

A new ClickFix attack is exploiting WorkFlowy to deliver malware stealthily. Users are tricked into executing commands that compromise their systems. It's crucial to understand this threat to protect your data.

SC Media·