Code Defence Cyber security

New “GhostClick” Campaign Targets Developers with Malicious npm Packages

A new, highly sophisticated supply chain attack named “GhostClick” is targeting JavaScript developers via malicious npm packages. The packages install a keylogger and a remote access trojan (RAT) on the developer’s machine, allowing attackers to steal source code and cloud credentials stored on the workstation.

Business Impact

This targets the “upstream” of the software supply chain. Compromising a developer’s machine is a direct route to injecting malicious code into production software or stealing proprietary intellectual property, posing a severe risk to product integrity.

Why It Happened

The attackers used “dependency confusion” and “typosquatting” to trick developers into installing the malicious packages. The malware executes during the post-install script, bypassing static code analysis by being heavily obfuscated.

Recommended Executive Action

Implement a policy requiring developers to use a dedicated, hardened environment (VDI or secure container) for high-privilege coding tasks. Mandate the use of private artifact registries and strict human review of new open-source dependencies.

Hashtags: #SupplyChain #NPM #DevOps #GhostClick #Malware #DeveloperSecurity #CyberSecurity #InfoSec

Scroll to Top

Review My Order

0

Subtotal