Supply Chain Attack Campaign
node-ipc@9.1.6, node-ipc@9.2.3, and node-ipc@12.0.1 contained obfuscated stealer/backdoor behavior. The malware appears to fingerprint the host environment, enumerate and read local files, compress and chunk collected data, wrap the payload in a cryptographic envelope, and attempt exfiltration through a network endpoint selected via DNS/address logic.
Ecosystems: npm
| Package Artifact | Published | Detected ▼ |
|---|---|---|
| 2026-05-14 14:25:30 UTC | 2026-05-14 14:29:40 UTC | |
| 2026-05-14 14:26:25 UTC | 2026-05-14 14:29:22 UTC | |
| 2026-05-14 14:26:01 UTC | 2026-05-14 14:29:20 UTC |
Showing 3 of 3