<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Npm Packages — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/npm-packages/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 23 Apr 2026 16:18:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/npm-packages/feed.xml" rel="self" type="application/rss+xml"/><item><title>CanisterSprawl: Self-Propagating npm Malware Campaign</title><link>https://feed.craftedsignal.io/briefs/2026-04-canistersprawl-npm-malware/</link><pubDate>Thu, 23 Apr 2026 16:18:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-canistersprawl-npm-malware/</guid><description>The CanisterSprawl malware campaign targets npm packages, using a self-propagating approach to steal sensitive data from developer machines, including tokens and API keys, and attempting to publish malicious packages using hijacked credentials.</description><content:encoded><![CDATA[<p>The CanisterSprawl campaign, first disclosed in April 2026, is a self-propagating malware targeting npm packages. This campaign focuses on stealing sensitive information, such as API keys, authentication tokens, and crypto wallet data from developer environments. The malware attempts to automate the process of publishing malicious packages to the npm registry using compromised developer accounts. By hijacking trusted credentials, CanisterSprawl seeks to extend its reach within the open-source ecosystem, turning a single compromised machine into a potential source of widespread supply chain attacks. This campaign highlights the need for robust security measures to prevent the installation of malicious packages and detect unauthorized activity within developer environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer installs a malicious npm package from the npm registry.</li>
<li>During installation, the package executes embedded code automatically.</li>
<li>The malware scans environment variables on the local system, looking for credentials and developer tokens.</li>
<li>The malware harvests browser credentials, crypto wallet data, and configuration files containing credentials.</li>
<li>The collected data is exfiltrated to an external server controlled by the attacker.</li>
<li>The malware attempts to locate an npm automation token on the infected machine.</li>
<li>If a token is found, the malware lists all packages to which the token grants &ldquo;write&rdquo; access.</li>
<li>The malware downloads the packages, injects the malicious script into them, and republishes them to the npm registry, spreading the infection to other projects.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful CanisterSprawl infections can lead to the exfiltration of sensitive data, including API keys, authentication tokens, and credentials, which can be used to gain unauthorized access to internal systems and services. The malware&rsquo;s self-propagating nature allows it to spread through the npm ecosystem, potentially compromising numerous projects and developer accounts. If successful, attackers can inject malicious code into trusted packages, leading to supply chain attacks that affect a large number of downstream consumers. This can damage the reputation of affected developers and organizations, and result in significant financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Remove any identified malicious packages immediately to prevent further data theft and propagation.</li>
<li>Rotate potentially compromised credentials, tokens, and API keys that may have been exposed from affected hosts.</li>
<li>Review environment variables and local credentials on developer machines for potential compromise.</li>
<li>Audit account activity for unauthorized publishing or access to the npm registry, as highlighted in the Overview section.</li>
<li>Deploy the Sigma rule to detect suspicious processes attempting to access sensitive files related to credentials.</li>
<li>Enable file integrity monitoring for common credential storage locations and configuration files to detect unauthorized access and modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>malware</category><category>npm</category></item></channel></rss>