ctrl/tinycolor and 40+ NPM Packages Compromised

25 points by repl


strugee

Is it just me, or was this article clearly written by a GPT? There’s a lot of weird details for no reason, like the repeated references to process.env (as if there’s something novel about this use of process.env - just say “it checks the environment”?), or the description of the malware “using [AWS] SDK pagination” to scan Secrets Manager. Like, this is just a bizarre detail to include - and what does it mean by “execution is likely triggered via a hijacked postinstall script”? Either it’s triggered that way, or it isn’t.

Just frustrating to read, honestly. I gave up pretty quickly since it was obvious the writing was low-quality.

yawaramin

The compromise begins with a sophisticated minified JavaScript bundle injected into affected packages

Tbh that sounds like the middle of the compromise. How was the minified bundle injected into the packages in the first place? Was it another successful phishing attack?

johnklos

It’s funny (and a little shocking) that something can be true enough that it becomes a meme - doing anything with NPM means installing hundreds, sometimes thousands of dependencies most which aren’t really needed - yet nobody takes it seriously enough to do something.

I wonder if this and the “Software packages with more than 2 billion weekly downloads hit in supply-chain attack” problem are enough to nudge people in the direction of fewer dependencies == good, or if this is now the new normal.

elobdog

These are unfortunate side effects of “curl | sudo bash” culture that trust any random package downloaded from the internet. npm repo as it exists today is a minefield, and a rich target for adversaries to compromise supply chains.