<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Pylangghost — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/pylangghost/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 16 Mar 2026 04:45:53 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/pylangghost/feed.xml" rel="self" type="application/rss+xml"/><item><title>PylangGhost RAT Observed on npm Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-pylangghost-npm/</link><pubDate>Mon, 16 Mar 2026 04:45:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pylangghost-npm/</guid><description>A new remote access trojan (RAT) named PylangGhost has been observed on the npm registry, posing a supply chain risk to developers and applications using affected packages.</description><content:encoded><![CDATA[<p>A new remote access trojan (RAT) named PylangGhost has been discovered on the npm registry. This marks the first known instance of this specific RAT being distributed via a software supply chain attack on the npm ecosystem. The RAT is named for its use of Python and potentially for obfuscation or evasion techniques. The affected npm packages are designed to inject malicious code into projects that depend on them. This malicious code facilitates unauthorized remote access to infected systems, thereby providing threat actors with the ability to exfiltrate sensitive data, deploy further malware, or perform other malicious activities. This is a supply chain attack that endangers developers and applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A developer installs a malicious package from the npm registry containing PylangGhost.</li>
<li>During the installation process, a post-install script or similar mechanism executes, injecting the PylangGhost RAT into the developer&rsquo;s environment.</li>
<li>The RAT establishes a connection to a command-and-control (C2) server controlled by the attacker.</li>
<li>The C2 server sends commands to the infected system, instructing the RAT to perform specific actions.</li>
<li>The RAT executes the commands, potentially including data exfiltration, downloading and executing additional payloads, or establishing persistence.</li>
<li>Sensitive data, such as credentials, API keys, or source code, is exfiltrated from the compromised system to the C2 server.</li>
<li>The attacker gains remote access and control over the compromised system, enabling further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The presence of PylangGhost on the npm registry introduces a significant supply chain risk.  Successful infection allows attackers to gain remote access to developer systems, potentially leading to the theft of sensitive source code, credentials, and other proprietary information. The compromise can extend to applications built using the infected packages, impacting downstream users and potentially leading to widespread data breaches or service disruptions. The number of affected victims is currently unknown, but the risk is widespread due to the popularity of the npm registry.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor npm package installations for suspicious post-install scripts or unexpected network connections (see related Sigma rules).</li>
<li>Implement strong dependency scanning tools to identify and remove potentially malicious packages from your projects.</li>
<li>Analyze network connection logs for connections to unusual or malicious domains after npm package installations (see related Sigma rules).</li>
<li>Enable process monitoring for any processes spawned during or after npm package installations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>rat</category><category>npm</category><category>pylangghost</category></item></channel></rss>