Jan. 23, 2024, 1 p.m. | lucija.valentic@reversinglabs.com (Lucija Valentić)

ReversingLabs Blog blog.reversinglabs.com




In January, ReversingLabs researchers discovered two malicious packages on the npm open source package manager that leveraged the GitHub platform to store stolen Base64 encrypted SSH keys lifted from developer systems that installed the malicious npm packages. 


Multiple versions of the malicious npm packages, warbeast2000 and kodiak2k were identified and have since been removed from npm. However, the campaign is just the latest example of cybercriminals and malicious actors using open source package managers and related infrastructure to support malicious …

base64 cybercriminals data developer encrypted github january keys malicious malicious npm malicious packages manager npm open source package package manager packages platform researchers reversinglabs ssh ssh keys stolen store systems threat research

More from blog.reversinglabs.com / ReversingLabs Blog

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Security Engineer II- Full stack Java with React

@ JPMorgan Chase & Co. | Hyderabad, Telangana, India

Cybersecurity SecOps

@ GFT Technologies | Mexico City, MX, 11850

Senior Information Security Advisor

@ Sun Life | Sun Life Toronto One York

Contract Special Security Officer (CSSO) - Top Secret Clearance

@ SpaceX | Hawthorne, CA

Early Career Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts