Three compromised versions of the node-ipc library, crucial for Node.js environments, have been identified, posing a significant threat to crypto developers. Security firm Slowmist reported on May 14 that versions 9.1.6, 9.2.3, and 12.0.1 of node-ipc were maliciously altered to steal over 90 types of credentials, including AWS keys and .env files, affecting over 822,000 weekly npm downloads.
The attack exploits a dormant maintainer account, allowing the attacker to re-register an expired email domain and gain publish access. The malicious payload, embedded in the CommonJS bundle, activates automatically, exfiltrating data via DNS tunneling. Developers are urged to audit their projects for these versions and revert to clean releases to mitigate credential theft risks.
Malicious Node-ipc Versions Compromise 822K Weekly Downloads, Steal AWS Keys
면책 조항: Phemex 뉴스에서 제공하는 콘텐츠는 정보 제공 목적으로만 제공됩니다. 제3자 기사에서 출처를 얻은 정보의 품질, 정확성 또는 완전성을 보장하지 않습니다.이 페이지의 콘텐츠는 재무 또는 투자 조언이 아닙니다.투자 결정을 내리기 전에 반드시 스스로 조사하고 자격을 갖춘 재무 전문가와 상담하시기 바랍니다.
