Jan. 23, 2024, 1 p.m. | lucija.valentic@reversinglabs.com (Lucija Valentić)

ReversingLabs Blog blog.reversinglabs.com




In January, ReversingLabs researchers discovered two malicious packages on the npm open source package manager that leveraged the GitHub platform to store stolen Base64 encrypted SSH keys lifted from developer systems that installed the malicious npm packages. 


Multiple versions of the malicious npm packages, warbeast2000 and kodiak2k were identified and have since been removed from npm. However, the campaign is just the latest example of cybercriminals and malicious actors using open source package managers and related infrastructure to support malicious …

base64 cybercriminals data developer encrypted github january keys malicious malicious npm malicious packages manager npm open source package package manager packages platform researchers reversinglabs ssh ssh keys stolen store systems threat research

More from blog.reversinglabs.com / ReversingLabs Blog

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States