- Cyber Syrup
- Posts
- Malicious npm and VS Code Extensions Used in Widespread Supply Chain Attacks
Malicious npm and VS Code Extensions Used in Widespread Supply Chain Attacks
Cybersecurity researchers have uncovered a series of malicious packages uploaded to the npm package registry and Visual Studio Code (VS Code) Marketplace, designed to exfiltrate sensitive data, destroy project files, and distribute further malware

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.
Find out why 1M+ professionals read Superhuman AI daily.
In 2 years you will be working for AI
Or an AI will be working for you
Here's how you can future-proof yourself:
Join the Superhuman AI newsletter – read by 1M+ people at top companies
Master AI tools, tutorials, and news in just 3 minutes a day
Become 10X more productive using AI
Join 1,000,000+ pros at companies like Google, Meta, and Amazon that are using AI to get ahead.
Malicious npm and VS Code Extensions Used in Widespread Supply Chain Attacks

Cybersecurity researchers have uncovered a series of malicious packages uploaded to the npm package registry and Visual Studio Code (VS Code) Marketplace, designed to exfiltrate sensitive data, destroy project files, and distribute further malware. These campaigns demonstrate the increasing sophistication of software supply chain attacks, where legitimate developer ecosystems are manipulated to serve as malware delivery channels.
Malicious npm Packages Harvesting System Information
Discovery
Researchers at Socket reported the detection of 60 malicious npm packages uploaded under three now-removed accounts: bbbb335656
, cdsfdfafd1232436437
, and sdsds656565
. These packages featured install-time scripts that were executed automatically when users ran npm install
.
Behavior and Capabilities
Designed to run on Windows, macOS, and Linux
Embedded scripts perform sandbox evasion checks
Collect:
Hostnames and usernames
Internal and external IP addresses
DNS server data
Network Interface Card (NIC) information
User directory paths
All harvested data was exfiltrated via a Discord webhook, allowing attackers to conduct detailed reconnaissance of victim environments. The goal appears to be network mapping and identifying high-value targets for potential follow-up attacks.
Destructive npm Packages Masquerading as Framework Helpers
In a related case, eight more npm packages were found masquerading as utility libraries for popular JavaScript frameworks such as React, Vue.js, Vite, and Node.js. These include:
vite-plugin-vue-extend
quill-image-downloader
js-bomb
js-hood
vue-plugin-bomb
vite-plugin-bomb
vite-plugin-bomb-extend
vite-plugin-react-extend
Once invoked, some of these packages execute destructive scripts that:
Delete critical project files
Corrupt JavaScript methods
Tamper with browser storage (
localStorage
,sessionStorage
, and cookies)Shutdown the system (
js-bomb
package)
According to researcher Kush Pandya, the attacker behind these packages, identified as xuxingfeng, also published several legitimate libraries, blurring the line between malicious and trustworthy content.
Phishing via npm and Open-Source JavaScript
Another novel attack combined email phishing with malicious npm packages. Victims received .HTM
attachments that embedded JavaScript from jsDelivr, linked to a rogue npm package named citiycar8
.
Attack Flow
Victim opens
.HTM
fileJavaScript loads a second-stage script from the npm package
Generates fake Office 365 login pages using the victim’s email
Credentials are stolen and sent to the attacker
This multi-layered attack used AES encryption, content delivery networks, and URL redirection to evade detection.
Malicious VS Code Extensions Targeting Cryptocurrency Developers
Datadog Security Research revealed another attack campaign involving malicious VS Code extensions designed to steal cryptocurrency wallet credentials, particularly from Solidity developers. The extensions, published by a threat actor named MUT-9332, included:
solaibot
among-eth
blankebesxstnion
Although marketed as vulnerability scanners and syntax tools, they secretly delivered multi-stage malware payloads that:
Stole wallet credentials
Installed malicious Chromium-based browser extensions
Disabled Windows Defender
Scanned application data for Discord, browser, and wallet data
A payload was also hidden within an image file hosted on the Internet Archive, showcasing the attacker’s creativity in obfuscation.
Broader Implications and Takeaways
These campaigns highlight the growing complexity and diversity of attacks targeting developer ecosystems:
npm Registry is increasingly abused to deliver information stealers, logic bombs, and phishing kits.
VS Code Marketplace is being used to infiltrate developer machines, particularly those working with blockchain and cryptocurrency technologies.
Recommendations
Use vetted tools for open-source package scanning (e.g., Socket, Snyk)
Check package metadata and authorship history
Avoid unfamiliar packages, especially those with recent publication dates or limited documentation
Audit development environments regularly
Educate developers about supply chain threats
Conclusion
These incidents reaffirm that open-source ecosystems are high-value targets for cybercriminals. From stealing data to corrupting systems and tricking users with phishing schemes, attackers are refining their tactics to exploit trust within the developer community. Mitigation requires a proactive security mindset, shared threat intelligence, and collaboration between the open-source community, enterprises, and security researchers.