Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Popular node-ipc npm package compromised to steal credentials
    Cybersecurity

    Popular node-ipc npm package compromised to steal credentials

    adminBy adminMay 16, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Popular node-ipc npm package compromised to steal credentials
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Popular node-ipc npm package compromised to steal credentials

    Hackers have injected credential-stealing malware into newly published versions of node-ipc, a popular inter-process communication package, in a new supply chain attack targeting npm.

    The node-ipc package is a Node.js module that enables various processes to communicate through all forms of sockets, including Unix, Windows, UDP, TLS, and TCP.

    Despite the maintainer publishing in March 2022 weaponized versions that targeted Russia and Belarus-based systems with a data-overwriting module, in protest to the Russian invasion of Ukraine, the package still has more than 690,000 weekly downloads on npm.

    The recent supply-chain attack was detected by multiple application security companies, including Socket, Ox Security, and Upwind, who confirmed the following three versions as malicious:

    • node-ipc@9.1.6
    • node-ipc@9.2.3
    • node-ipc@12.0.1

    The malicious code hides inside the CommonJS entrypoint (node-ipc.cjs) and executes automatically whenever applications are loaded.

    The malware is heavily obfuscated and fingerprints infected systems, collects environment variables and sensitive local files, compresses the stolen data into archives, and exfiltrates it through DNS TXT queries.

    The latest compromise appears to be the work of an external actor who compromised the account of an inactive maintainer named ‘atiertant.’

    According to the researchers, the infostealer injected in the new node-ipc versions collects the following types of information from compromised systems:

    • Cloud credentials from AWS, Azure, GCP, OCI, DigitalOcean, and others
    • SSH keys and SSH configs
    • Kubernetes, Docker, Helm, and Terraform credentials
    • npm, GitHub, GitLab, and Git CLI tokens
    • .env files and database credentials
    • Shell histories and CI/CD secrets
    • macOS Keychain files and Linux keyrings
    • Firefox profile and key database files (on macOS)
    • Microsoft Teams local storage and IndexedDB paths

    The malware skips files larger than 4 MiB and avoids scanning .git and node_modules directories to increase efficiency and reduce operational noise on the host.

    Attack overview
    Attack overview
    Source: Ox Research

    A notable operational characteristic is the use of DNS TXT queries instead of conventional HTTP-based command-and-control (C2) traffic for data exfiltration. The attackers use a fake Azure-themed domain (sh[.]azurestaticprovider[.]net:443) as a bootstrap resolver, transmitting the data to ‘bt[.]node[.]js’ with query prefixes like xh, xd, and xf.

    According to Socket, exfiltrating a 500 KB compressed archive could generate roughly 29,400 DNS TXT requests, helping the traffic blend into normal DNS activity.

    Prior to submission, the malware stores collected data in temporary compressed tar.gz archives, which are deleted after exfiltration to reduce forensic traces.

    The malware does not establish persistence or download any secondary payloads, so the operation appears focused on rapid credential theft and exfiltration.

    Potentially impacted developers should immediately remove the affected versions, rotate exposed secrets and credentials, and inspect lockfiles and npm caches.


    article image

    Automated pentesting tools deliver real value, but they were built to answer one question: can an attacker move through the network? They were not built to test whether your controls block threats, your detection rules fire, or your cloud configs hold.

    This guide covers the 6 surfaces you actually need to validate.

    Download Now

    Compromised Credentials NodeIPC npm Package popular steal
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleOpenAI Hit by TanStack Supply Chain Attack
    Next Article Keycard helps developers secure autonomous AI agents with scoped access
    admin
    • Website

    Related Posts

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026

    Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google adds llms.txt check to Chrome Lighthouse

    May 20, 2026

    Riverbed expands autonomous AI capabilities for Aternity platform

    May 20, 2026

    What’s New in WordPress 7.0? (Features & Screenshots)

    May 20, 2026

    How Denis Yurchak Built Yadaphone to $17,500 a Month and 20,000 Users in Just Over a Year After the Skype Shut Down

    May 20, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,208)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (305)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google adds llms.txt check to Chrome Lighthouse

    May 20, 2026

    Riverbed expands autonomous AI capabilities for Aternity platform

    May 20, 2026

    What’s New in WordPress 7.0? (Features & Screenshots)

    May 20, 2026
    Most Popular
    • Google adds llms.txt check to Chrome Lighthouse
    • Riverbed expands autonomous AI capabilities for Aternity platform
    • What’s New in WordPress 7.0? (Features & Screenshots)
    • How Denis Yurchak Built Yadaphone to $17,500 a Month and 20,000 Users in Just Over a Year After the Skype Shut Down
    • How to do SEO for beginners
    • Google Introduces New Ad Formats In AI Mode
    • AI reshapes cybersecurity workforce priorities as IT teams brace for new risks
    • How to stand out in AI search when every business sounds the same
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.