Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内。首先,我需要仔细阅读文章,理解其主要内容。文章讲的是网络安全研究人员发现了一个恶意的npm包,名字是"@acitons/artifact",它模仿了合法的"@actions/artifact"包,目的是攻击GitHub拥有的仓库。 接下来,文章提到这个恶意包通过后安装钩子下载并运行恶意软件,有六个版本被观察到这样做。不过最新的版本是4.0.10,说明攻击者已经移除了有问题的版本。这个包在npm上下载量还挺大的,每周有3万多次下载。 还有,Veracode还发现了另一个类似的包,但已经被下架了。进一步分析显示,恶意软件会在特定时间后停止执行,并收集GitHub Actions的工作流程变量,将数据加密发送到特定的子域名。 用户的要求是用中文总结,控制在100字以内,并且不需要以“文章内容总结”这样的开头。所以我要提炼出关键点:恶意npm包模仿合法包攻击GitHub仓库,通过后安装钩子下载恶意软件,下载量大且已被移除。 现在把这些信息浓缩成一句话:研究人员发现恶意npm包@acitons/artifact模仿@actions/artifact攻击GitHub仓库,通过后安装钩子下载并运行恶意软件。该包已下架多个版本,累计下载47,405次。 检查一下字数是否在100字以内,并且没有使用任何开头词。看起来符合要求。 </think> 研究人员发现恶意npm包@acitons/artifact模仿@actions/artifact攻击GitHub仓库,通过后安装钩子下载并运行恶意软件。该包已下架多个版本,累计下载47,405次。 2025-11-11 11:55:0 Author: thehackernews.com(查看原文) 阅读量:1 收藏

Software Supply Chain / Malware

Cybersecurity researchers have discovered a malicious npm package named "@acitons/artifact" that typosquats the legitimate "@actions/artifact" package with the intent to target GitHub-owned repositories.

"We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build environment, and then use those tokens to publish new malicious artifacts as GitHub," Veracode said in an analysis.

The cybersecurity company said it observed six versions of the package – from 4.0.12 to 4.0.17 – that incorporated a post-install hook to download and run malware. That said, the latest version available for download from npm is 4.0.10, indicating that the threat actor behind the package, blakesdev, has removed all the offending versions.

DFIR Retainer Services

The package was first uploaded on October 29, 2025, and has since accrued 31,398 weekly downloads. In total, it has been downloaded 47,405 times, according to data from npm-stat. Veracode also said it identified another npm package named "8jfiesaf83" with similar functionality. It's no longer available for download, but it appears to have been downloaded 1,016 times.

Further analysis of one of the malicious versions of the package has revealed that the postinstall script is configured to download a binary named "harness" from a now-removed GitHub account. The binary is an obfuscated shell script that includes a check to prevent execution if the time is after 2025-11-06 UTC.

It's also designed to run a JavaScript file named "verify.js" that checks for the presence of certain GITHUB_ variables that are set as part of a GitHub Actions workflow, and exfiltrates the collected data in encrypted format to a text file hosted on the "app.github[.]dev" subdomain.

"The malware was only targeting repositories owned by the GitHub organization, making this a targeted attack against GitHub," Veracode said. "The campaign appears to be targeting GitHub's own repositories as well as a user y8793hfiuashfjksdhfjsk which exists but has no public activity. This user account could be for testing."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/11/researchers-detect-malicious-npm.html
如有侵权请联系:admin#unsafe.sh