These NPM tools are actually just installing malware

Best Cloud Mining
(Image credit: André François McKenzie / Unsplash)

Cybersecurity researchers from Check Point have discovered 16 typosquatted packages on the NPM repository that install cryptocurrency miners.

NPM is one of the more popular JavaScript repositories, hosting more than two million open source packages that developers can use to speed up software development. 

As such, it’s an attractive target for cybercriminals engaging in supply chain attacks. Developers that download malicious packages risk not only their endpoints, but also those that end up using their products. 

Impersonating a speed test package

In this incident, an unknown threat actor using the alias “trendava” uploaded 16 malicious packages on January 17, all of which pretend to be internet speed testers. They all have names similar to an actual speed tester, but they are designed to install a cryptocurrency miner on the target device. Some of the names are speedtestbom, speedtestfast, speedtestgo, and speedtestgod.

A cryptocurrency miner uses the computer’s processing power, electricity, and internet, to generate tokens, which can later be sold on an exchange for fiat currencies (US dollars, euros, etc.). When active, the miner takes up almost all of the device’s computing power, rendering it useless for anything else. Miners are quite popular malware these days, with threat actors looking to install XMRig on servers and other powerful devices. XMRig mines Monero (XMR), a privacy coin that is almost impossible to trace. 

NPM removed all of the malicious packages a day after they were uploaded, on January 18.

Commenting on the fact that there are 16 similar packages, the researchers said it is possible that the attackers were engaged in trial-and-error:

"It is fair to assume these differences represent a trial the attacker did, not knowing in advance which version will be detected by the malicious packages’ hunter tools and therefore trying different ways with which to hide their malicious intent," CheckPoint said. "As part of this effort, we’ve seen the attacker hosting the malicious files on GitLab. In some cases, the malicious packages were interacting directly with the crypto pools, and in some cases, they seem to leverage executables for that need."

The best way to protect against typosquatting is to be careful when deploying open-source code and only use packages from reputable sources.

Via: BleepingComputer

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
Image depicting a hand on a scanner
New Lazarus Group campaign sees North Korean hackers spreading undetectable malware through GitHub and open source packages
botnet
YouTubers targeted by blackmail campaign to promote malware on their channels
An abstract image of digital security.
Hundreds of GitHub repositories hijacked to trick users into downloading malware
GitHub Webpage
A cracked malicious version of a Go package lay undetected online for years
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
Latest in Security
Data leak
Top home hardware firm data leak could see millions of customers affected
Representational image depecting cybersecurity protection
Third-party security issues could be the biggest threat facing your business
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
Android Logo
Devious new Android malware uses a Microsoft tool to avoid being spotted
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025
Latest in News
Buzz Lightyear Space Ranger Spin Rennovations
Disney’s giving a classic Buzz Lightyear ride a tech overhaul – here's everything you need to know
Hisense U8 series TV on wall in living room
Hisense announces 2025 mini-LED TV lineup, with screen sizes up to 100 inches – and a surprising smart TV switch
Nintendo Music teaser art
Nintendo Music expands its library with songs from Kirby and the Forgotten Land and Tetris
Opera AI Tabs
Opera's new AI feature brings order to your browser tab chaos
An image of Pro-Ject's Flatten it closed and opened
Pro-Ject’s new vinyl flattener will fix any warped LPs you inadvertently buy on Record Store Day
The iPhone 16 Pro on a grey background
iPhone 17 Pro tipped to get 8K video recording – but I want these 3 video features instead