
Author: CyberDudeBivash
Powered by: CyberDudeBivash Brand | cyberdudebivash.com
Related:cyberbivash.blogspot.com
Published by CyberDudeBivash • Date: Oct 30, 2025 (IST)
Is Your Project Compromised? Check for the 126 Malicious npm Packages in the PhantomRaven Attack
A new npm supply-chain campaign called PhantomRaven pushes 126 malicious packages with 86,000+ downloads, exfiltrating GitHub tokens, npm credentials, and CI/CD secrets via “invisible dependencies.” Audit and clean your projects now.
Edureka (AppSec/Supply-Chain)Kaspersky SecurityAliExpress WWAlibaba WWCyberDudeBivash Ecosystem:Apps & Services · Threat Intel (Blogger) · CryptoBivash · News Portal · Subscribe: ThreatWire
TL;DR — Audit Now, Rotate Tokens, Lock Your Pipeline
- Campaign: PhantomRaven uses 126 malicious npm packages (since Aug 2025) with >86k downloads to steal tokens/secrets.
- Technique: “Invisible dependencies” and obfuscated install scripts to evade basic scanners.
- Action: Identify tainted deps → remove & reinstall clean → rotate GitHub/npm/CI tokens → enable provenance/2FA → enforce extension/package allowlists.
Contents
- What We Know About PhantomRaven
- Immediate Self-Check (15 Minutes)
- Cleanup & Token Rotation
- Hardening npm + GitHub + CI/CD
- Enterprise Guardrails & Policies
- FAQ
- Sources
What We Know About PhantomRaven
- Scale: 126 packages; >86,000 downloads.
- Target: Developer machines and CI — stealing GitHub tokens, npm tokens, cloud keys.
- Tactics: Obfuscated installers, hidden/“invisible” deps, immediate exfiltration via HTTP to attacker infra.
- Timeline: Active since Aug 2025; multiple writeups surfaced Oct 29–30, 2025.
Immediate Self-Check (15 Minutes)
- List installed deps:npm ls –all –json > deps-tree.jsonScan for recently added/unknown publishers; compare with writeups’ package lists (see Sources).
- Search lockfiles for suspicious/new names:grep -Ei “phantom|raven|obfus|postinstall|preinstall” package-lock.json
- Block install scripts temporarily while triaging:npm config set ignore-scripts true
- Check npm auth:npm token listRevoke anything you don’t recognize.
- GitHub audit: Settings → Developer settings → Personal access tokens & SSH/GPG keys; remove unknown keys/apps; review recent security logs.
Cleanup & Token Rotation (Do This Even If Unsure)
- Remove suspects from
package.jsonand lockfile. Then:rm -rf node_modules package-lock.json && npm ci - Rotate credentials immediately:
- Revoke/regenerate GitHub PATs, npm tokens, registry creds, and CI secrets.
- Replace any long-lived cloud keys with short-lived, scoped tokens.
- Artifact hygiene: Rebuild artifacts from clean state; invalidate suspicious builds, caches, and Docker layers.
- Restore installs safely: After cleanup, re-enable scripts only for trusted packages you control:npm config delete ignore-scripts
Hardening npm + GitHub + CI/CD
- 2FA everywhere (GitHub org required), enforce SSO, and enable provenance/attestations for packages.
- Private registries/allowlists: mirror and pin vetted packages; block unknown publishers by default.
- Review diffs on dependency bumps; forbid unreviewed
postinstall/preinstallscripts. - EDR/SWG egress watch: alert on zipping large repos + HTTP POST to new domains right after
npm i. - SBOM + SCA: generate SBOM (CycloneDX) and scan for tainted transitive deps; fail builds on hits.
Enterprise Guardrails & Policies
- Registry policy: Force all installs through an internal proxy/Artifactory with curated allowlists.
- Least-privilege CI: ephemeral runners, no long-lived PATs, OIDC-based temp creds, outbound egress allow-list.
- Extension governance: combine with VS Code extension allowlists (recent waves abused dev tools).
- Incident comms: org-wide bulletin—rotate tokens, verify repos, and re-build from clean state.
FAQ
Where can I see the full list of 126 packages?
Research posts and newsrooms list the campaign’s packages and indicators; start with Koi’s analysis and newsroom recaps today.
We use only transitive dependencies—are we still at risk?
Yes. PhantomRaven abuses transitive/“invisible” deps to hide malicious code in the install path. Audit lockfiles and SBOMs.
Is this tied to other npm waves?
It follows other large npm compromises this fall; the pattern (token theft → package takeover → wormy spread) mirrors recent campaigns. Use strict allowlists and provenance.
CyberDudeBivash Services, Apps & Ecosystem
Services (Hire Us)
- Software Supply-Chain Reviews (npm, registries, build systems)
- Incident Response: Token Rotation & Repo Remediation
- Developer Endpoint Hardening & EDR Tuning
- Secure Build Provenance & Release Signing Programs
Explore Apps & ProductsConsulting & ServicesSubscribe to ThreatWire
Our Departments & Pages
- Main Site — Apps & Services
- CyberBivash — Threat Intel & CVEs
- CryptoBivash — Crypto/Blockchain
- CyberDudeBivash News — Headlines
- ThreatWire Newsletter
Sources
- Koi Security — “PhantomRaven: NPM Malware Hidden in Invisible Dependencies” (Oct 29, 2025): 126 packages; 86k+ downloads; token/secret theft.
- BleepingComputer — “PhantomRaven attack floods npm with credential-stealing packages” (Oct 29, 2025): campaign details, downloads, timeline.
- The Hacker News — “PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens” (Oct 30, 2025).
- CyberSecurityNews — “PhantomRaven Attack Involves 126 Malicious npm Packages…” (Oct 30, 2025).
- Dark Reading / Infosecurity — on “invisible dependencies” evasion used in npm malware.
Ecosystem: cyberdudebivash.com | cyberbivash.blogspot.com | cryptobivash.code.blog | cyberdudebivash-news.blogspot.com | ThreatWire
Author: CyberDudeBivash • Powered by CyberDudeBivash • © 2025
#CyberDudeBivash #CyberBivash #npm #SupplyChain #PhantomRaven #GitHub #DevSecOps #TokenTheft #ThreatWire
Leave a comment