Node.js Maintainers Targeted - Sophisticated Social Engineering Scheme

Basically, hackers are tricking Node.js developers to steal their access and compromise software.
A coordinated social engineering scheme is targeting Node.js developers, risking the integrity of widely used software packages. This alarming trend highlights the need for vigilance in the open-source community.
What Happened
A sophisticated social engineering campaign is currently targeting top open-source developers within the Node.js and npm ecosystem. This follows the recent compromise of the popular package Axios, which boasts over 100 million weekly downloads. Several high-impact software maintainers have reported similar attacks, indicating a strategic shift by advanced threat actors aiming to poison the global software supply chain.
Who's Affected
The attackers are specifically hunting developers who maintain foundational JavaScript tools. This includes the creators and maintainers of widely used packages such as WebTorrent, Lodash, Fastify, and dotenv. These essential tools are downloaded billions of times every month by companies around the world, making their maintainers prime targets.
The Threat
Security researchers have linked these attacks to a North Korean threat group known as UNC1069. Their approach is patient and deceptive, often spanning weeks. They reach out to developers on professional platforms like LinkedIn or Slack, using fake personas from spoofed companies like “Openfort.”
Tactics & Techniques
The attackers build trust over time, scheduling calls and inviting developers to private Slack channels. The trap is set during a scheduled video call when hackers send a link to a fake meeting platform designed to mimic Microsoft Teams or Streamyard. When the victim joins, they encounter a fake audio failure, prompting them to download an application or run a command in their terminal, which triggers the actual attack.
Signs of Infection
If a developer falls for the trick, the download installs a hidden Remote Access Trojan (RAT). This malware silently collects sensitive data from the victim’s computer, including browser cookies, cloud credentials, password keychains, and active developer tokens. It contacts the hackers every sixty seconds for new instructions, undermining standard security measures like two-factor authentication.
Defensive Measures
The attackers’ ability to bypass login screens grants them immediate control to publish code directly to the npm registry. This shift from targeting individual cryptocurrency founders to compromising popular npm packages allows them to reach millions of users through automated updates. Security experts urge the open-source community to remain vigilant and support each other, emphasizing that anyone could be tricked by these highly convincing tactics.
As these advanced threats grow, the safety of modern applications increasingly relies on protecting the developers who build our foundational code.