The campaign appears to be the work of a single threat actor deploying multiple infostealer variants simultaneously through a coordinated typosquatting operation targeting Axios users.
The four packages chalk-template, @deadcode09284814/axios-util, axios-utils, and color-style-utils were detected within the last 24 hours.
All versions of each package are considered malicious. Combined, they have accumulated approximately 2,678 weekly downloads before being flagged.
The most alarming discovery is chalk-tempalte, which contains a near-identical clone of the Shai-Hulud infostealer, an open-source malware whose source code was publicly leaked on GitHub by the group TeamPCP just last week.
The threat actor copied the code with minimal modification, embedding their own C2 server address (87e0bbc636999b[.]lhr[.]life) and private key, then uploaded the working package directly to npm.
The lack of obfuscation, a stark contrast to the original Shai-Hulud deployments, confirms this is a copycat actor rather than TeamPCP itself.
Researchers noted the attack aligns with a supply chain attack competition posted on BreachForums shortly after TeamPCP’s leak, suggesting the open-source release is actively inspiring new campaigns.
Infected machines upload stolen credentials to a new GitHub repository, mirroring the original Shai-Hulud behavior.
Each package targets a different attack objective:
80[.]200[.]28[.]28:2222edcf8b03c84634[.]lhr[.]lifeAnyone who installed any version of these packages should act immediately:
| Indicator | Type |
|---|---|
87e0bbc636999b[.]lhr[.]life | C2 Domain |
80[.]200[.]28[.]28:2222 | C2 IP:Port |
b94b6bcfa27554[.]lhr[.]life | C2 Domain |
edcf8b03c84634[.]lhr[.]life | C2 Domain |
[.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.This campaign signals a dangerous new trend: the democratization of sophisticated malware. With Shai-Hulud now publicly available, the barrier to launching capable supply chain attacks has dropped dramatically.
OX Security warns this is likely just the first wave, as vibe-coded malware proliferates across npm, with each variant harvesting different data types for various criminal purposes, from credential theft and crypto-draining to full botnet recruitment, all from a single npm account.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post Four Malicious npm Packages Steal SSH Keys, Cloud Credentials, and Crypto Wallets appeared first on Cyber Security News.
Fresh from its huge early access launch, underwater survival and crafting adventure game Subnautica 2…
dither-avatar is a lightweight, zero-dependency JavaScript library that generates deterministic, dithered SVG avatars from any…
The cyber battlefield in Eastern Europe is escalating once again. Relentless Russian state-sponsored threat actors…
Three critical vulnerabilities have been disclosed in n8n, the popular open-source workflow automation platform, any…
A critical pre-authentication remote code execution (RCE) vulnerability has been discovered in Marimo, a widely…
A critical heap buffer overflow flaw in F5 NGINX, tracked as CVE-2026-42945, has moved from disclosure…
This website uses cookies.