BotBeat
...
← Back

> ▌

N/AN/A
INDUSTRY REPORTN/A2026-04-08

Three @fairwords NPM Packages Compromised by Advanced Credential-Stealing Worm

Key Takeaways

  • ▸Coordinated attack on three dormant packages suggests deliberate targeting of a specific organization's npm scope, likely through account compromise or insider threat
  • ▸The worm's sophisticated design includes comprehensive credential harvesting across 40+ cloud/SaaS providers (AWS, GCP, Azure, GitHub, OpenAI, Stripe, Anthropic, Cohere), cryptocurrency wallets, and browser password managers
  • ▸Self-propagation mechanism demonstrated actual exploitation—second-generation packages published within 8 minutes using stolen npm token, creating persistent infection vector for downstream consumers
Source:
Hacker Newshttps://safedep.io/malicious-fairwords-npm-credential-worm/↗

Summary

Three npm packages under the @fairwords scope (@fairwords/websocket, @fairwords/loopback-connector-es, and @fairwords/encryption) were simultaneously compromised on April 8, 2026, with malicious postinstall hooks injected into versions 1.0.38, 1.4.3, and 0.0.5. The attack deployed a 1,149-line credential harvesting payload capable of stealing environment variables, SSH keys, cloud credentials, cryptocurrency wallet data, and Chrome saved passwords, with the ability to self-propagate across npm packages and attempt cross-ecosystem infection via PyPI. The worm uses RSA-4096 encryption and exfiltrates stolen data through redundant channels including HTTPS webhooks and Internet Computer (ICP) canisters. Within 8 minutes of the initial compromise, the malware self-propagated by publishing second-generation versions (1.0.39, 1.4.4, 0.0.6) using the stolen npm token, confirming successful token compromise and demonstrating sophisticated supply chain attack capabilities. The @fairwords scope is maintained by FairWords/MyComplianceOffice, a compliance software company with 21 maintainers, and the affected packages had been dormant since 2022 before this coordinated attack.

  • Cross-ecosystem propagation attempt to PyPI indicates adversary's intent to maximize blast radius across Python and Node.js supply chains
CybersecurityPrivacy & DataMisinformation & Deepfakes

More from N/A

N/AN/A
INDUSTRY REPORT

Critical Linux Kernel Vulnerability 'Dirty Frag' Enables Unprivileged Privilege Escalation

2026-05-11
N/AN/A
INDUSTRY REPORT

Taylor Swift Trademarks Voice and Image to Combat AI-Generated Impersonations

2026-04-27
N/AN/A
INDUSTRY REPORT

AI Boom Strains Global Computing Infrastructure as Demand for Computational Power Reaches Critical Levels

2026-04-24

Comments

Suggested

Mistral AIMistral AI
RESEARCH

Researchers Reveal Critical Vulnerability in Voice AI Assistants via Imperceptible Audio Hijacking

2026-05-23
AnthropicAnthropic
RESEARCH

Claude Mythos Preview Uncovers 10,000+ High-Risk Vulnerabilities, Exposing Critical Patching Bottleneck

2026-05-23
MetaMeta
POLICY & REGULATION

Texas Attorney General Sues Meta Over WhatsApp Encryption Claims

2026-05-23
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us