⚠️ Massive Supply-Chain Attack Targets Developers via Malicious npm Packages
Security researchers have uncovered an active software supply-chain campaign spreading through the npm ecosystem that behaves like a self-propagating worm. The operation relies on at least 19 malicious packages designed to infiltrate developer machines, steal sensitive data, and expand automatically using compromised accounts.
The campaign, tracked under the name SANDWORM_MODE, borrows techniques from earlier advanced attacks but introduces new capabilities specifically aimed at modern development environments, cloud pipelines, and AI tools.
🧬 What Makes This Attack So Dangerous
Unlike typical malware that targets end users, this operation focuses on developers, who often hold privileged access to source code, cloud systems, and production environments.
Once installed, the malicious packages can collect:
- System details and environment data
- Access tokens and API keys
- Cloud credentials and secrets
- Cryptocurrency wallet keys
- Authentication data tied to development tools
Stolen identities can then be used to compromise additional repositories, publish more malicious packages, or infiltrate CI/CD pipelines.
🔁 Worm-Like Propagation Across GitHub and npm
The malware spreads by abusing compromised npm and GitHub accounts. After harvesting credentials, it attempts to replicate itself by publishing additional malicious code or modifying projects tied to the victim.
Researchers also observed advanced exfiltration techniques, including fallback methods using DNS if normal communication channels are blocked. Persistence mechanisms allow the malware to survive system reboots and remain hidden.

🧠 Attack Targets AI Coding Tools and Assistants
One of the most alarming features is a module specifically designed to manipulate AI-powered coding tools. The attackers deploy a rogue service that appears to be a legitimate plugin provider but secretly injects malicious instructions.
This allows the malware to retrieve sensitive files from the developer’s system, including:
- SSH private keys
- Cloud provider credentials
- Environment configuration files
- Package manager tokens
Popular development environments and AI coding assistants appear to be among the targets, reflecting how attackers are adapting to AI-driven workflows.
🪪 Theft of LLM API Keys and Cloud Credentials
The operation also hunts for API keys used by major AI platforms and cloud services. These keys can provide direct access to expensive computing resources, proprietary data, or internal systems.
By exploiting automated workflows, attackers can move quickly from a single compromised workstation to broader infrastructure.

🧪 Built-In Obfuscation to Evade Detection
The malware includes features designed to alter its own code dynamically, making detection more difficult. It can rename variables, restructure logic, and insert meaningless code to disguise its true behavior.
Although some of these features were disabled in observed samples, researchers believe they may be activated in future versions.
⏳ Delayed Activation to Avoid Suspicion
The attack unfolds in stages. An initial component quietly gathers credentials and other valuable data. A second, more aggressive phase activates after a delay of several days, enabling deeper system compromise and broader spread.
This delayed behavior helps the malware evade security monitoring that focuses on immediate suspicious activity.
🧨 Potential Destructive Capability
Investigators also found a dormant routine capable of wiping a system’s home directory if the malware loses contact with its command infrastructure. While not currently active, the presence of this feature suggests the attackers may deploy destructive actions in certain scenarios.

🚨 Additional Malicious Packages Deliver Remote Access Trojans
Separate investigations uncovered other npm packages posing as legitimate development tools but secretly installing remote access malware across Windows, macOS, and Linux systems.
These threats enable attackers to:
- Control infected machines remotely
- Steal files and credentials
- Move laterally across networks
- Create new administrative accounts
- Capture screenshots and clipboard data
Some variants disguise themselves as common utilities, making them difficult to distinguish from legitimate software.
🎯 Developers in Specific Ecosystems Targeted
Evidence suggests certain developer communities are being singled out, including those working with blockchain technologies and specialized programming frameworks. Fake extensions mimicking official tools have also been used to deliver additional malware payloads.
🛡️ What Developers Should Do Immediately
Anyone who suspects exposure should take urgent action:
- Remove suspicious packages immediately
- Rotate all access tokens and API keys
- Audit repositories and workflow configurations
- Review CI/CD systems for unauthorized changes
- Monitor accounts for unusual activity
Because these attacks leverage trusted credentials, the damage can extend far beyond a single machine.
🧭 The Bigger Picture: Supply-Chain Attacks Are Escalating
This campaign highlights a growing trend in cybercrime: targeting software supply chains instead of end users. By compromising widely used packages or developer tools, attackers can reach thousands of downstream systems at once.
As development environments become more automated and interconnected, protecting credentials, dependencies, and build pipelines is now critical to overall security.

