27 Malicious npm Packages Used in Phishing Attacks on Healthcare, Industrial Sectors

Cyber attackers uploaded 27 malicious packages to npm, using its CDN to host phishing pages mimicking Microsoft and document-sharing services, targeting sales staff in healthcare and industrial sectors for credential theft. This highlights escalating supply chain vulnerabilities in open-source registries, urging enhanced security measures and developer vigilance.
27 Malicious npm Packages Used in Phishing Attacks on Healthcare, Industrial Sectors
Written by Sara Donnelly

The npm Phishing Labyrinth: How Cyber Attackers Hijacked a Code Hub for Credential Heists

In the vast ecosystem of software development, where millions of lines of code are shared and reused daily, a new breed of cyber threat has emerged, turning trusted repositories into traps for unsuspecting users. Recent discoveries reveal that attackers have infiltrated the Node Package Manager (npm), the world’s largest software registry for JavaScript, by uploading 27 malicious packages designed not for traditional malware delivery but as sophisticated phishing infrastructure. These packages, masquerading as legitimate tools, hosted fake login pages that mimicked popular services like Microsoft and document-sharing platforms, luring victims into surrendering their credentials. This operation, uncovered by cybersecurity researchers, highlights a shift in tactics where open-source platforms are weaponized for targeted social engineering attacks rather than broad infections.

The campaign came to light through vigilant monitoring by security firms, with details first reported in a The Hacker News article. According to the report, the packages were uploaded over a five-month period, starting in July 2025, and were used to host phishing lures on npm’s content delivery network (CDN). These lures targeted sales personnel at 25 companies in the industrial and healthcare sectors, employing deceptive pages that imitated secure document viewers and Microsoft authentication prompts. Once victims entered their login details, the credentials were harvested and exfiltrated to attacker-controlled servers, often without raising immediate alarms due to the packages’ seemingly benign nature.

This isn’t an isolated incident but part of a growing pattern of abuse within npm. Back in October 2025, a similar effort known as “Beamglea” involved 175 malicious packages aimed at credential theft, as detailed by software supply chain security experts. The persistence of such attacks underscores the vulnerabilities in open-source registries, where low barriers to entry allow threat actors to publish code with minimal scrutiny. In this latest case, the packages avoided executing harmful scripts on users’ machines, instead leveraging npm’s infrastructure to host static phishing content, making detection by traditional antivirus tools challenging.

Unmasking the Phishing Mechanics

Experts analyzing the packages found that they contained no executable code but served as vessels for HTML and JavaScript files that rendered convincing phishing interfaces. For instance, some packages hosted pages that prompted users to “view a shared document,” complete with forged branding from services like DocuSign or SharePoint. Upon interaction, these pages captured keystrokes and form data, relaying them to remote endpoints. The operation’s subtlety lay in its distribution: attackers didn’t need to trick developers into installing the packages; instead, they used npm’s CDN to serve the phishing content directly via URLs embedded in spam emails or malicious links.

The targeted nature of the campaign suggests a high degree of reconnaissance. Victims were primarily sales staff, who often handle sensitive communications and are more likely to click on document-sharing links. This focus on specific industries like healthcare and manufacturing points to potential motives beyond simple credential theft, such as industrial espionage or ransomware preparation. Cybersecurity analysts note that stolen Microsoft credentials could grant access to corporate networks, email systems, and cloud resources, amplifying the potential damage.

Drawing from broader trends, posts on X (formerly Twitter) from security researchers in late 2025 highlighted similar supply chain compromises, with one user warning of npm packages being hijacked for credential swaps in crypto wallets. While not directly linked, these discussions reflect a heightened awareness in the developer community about the risks of unverified dependencies. The npm registry, which sees billions of downloads weekly, has become a prime target because of its centrality in modern web development.

Echoes of Past Compromises

Historical context reveals that npm’s troubles with malicious packages are not new. In September 2025, the Cyber Security Agency of Singapore issued an alert about an ongoing supply chain attack involving compromised npm packages with self-propagating payloads, as reported on their official site. This incident infected other packages, spreading like a worm and scanning for sensitive credentials such as GitHub tokens and cloud API keys.

Similarly, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released guidance in response to a widespread compromise dubbed “Shai-Hulud,” a self-replicating worm that affected over 500 packages, according to their alert. Named after the sandworm from Frank Herbert’s “Dune,” this malware targeted developer environments, exfiltrating data to fuel further attacks. These events set the stage for the phishing-focused campaigns, showing how attackers evolve from direct malware injection to more covert uses of registry infrastructure.

In another twist, a December 2025 report from The Hacker News described a malicious npm package that evaded AI security tools by hiding prompts and scripts, blending into developer workflows. This technique allowed threats to bypass automated scanners, a method that could have inspired the phishing packages’ static, non-executable design. The cumulative effect of these incidents has prompted calls for stricter registry policies, including mandatory code reviews and enhanced monitoring for anomalous uploads.

Developer Defenses and Industry Responses

To combat these threats, developers are advised to adopt rigorous vetting processes for dependencies. Tools like Socket, which detected a major npm attack in September 2025 as mentioned in X posts from security experts, scan for malicious behaviors in real-time. Such platforms analyze package updates for signs of compromise, such as unusual network calls or credential access attempts, providing an early warning system.

Industry leaders have also stepped up. Amazon Web Services (AWS) shared lessons from responding to npm campaigns in a blog post, noting the discovery of 150,000 compromised packages. Their teams automated registrations with the OpenSSF malicious package registry, enabling rapid community-wide protections. This collaborative approach has been crucial, as individual developers often lack the resources to monitor the entire registry.

Moreover, firms like Cycode have investigated hidden malicious code in npm packages, emphasizing regular codebase audits in their January 2025 analysis. They recommend using security scanners to flag vulnerabilities and exercising caution with new dependencies. These measures, while effective, require a cultural shift in development practices, prioritizing security over speed.

The Broader Implications for Supply Chains

The phishing campaign’s success exposes deeper flaws in software supply chains. With npm hosting over 2 million packages and facilitating billions of downloads, a single compromise can ripple through countless applications. Recent X discussions from cybersecurity accounts in December 2025 warned of packages posing as crypto libraries to steal wallet data, illustrating how threats extend beyond traditional sectors into emerging fields like blockchain.

Unit 42 from Palo Alto Networks detailed the “Shai-Hulud” worm in a November 2025 update, noting its self-replication across hundreds of packages. This mirrors findings from Xygeni, which recapped 2025’s malicious package trends in a blog, highlighting automated publishing and impersonation tactics. Such patterns suggest attackers are automating their operations, making manual detection obsolete.

In response, registries like npm have implemented AI-driven anomaly detection, but gaps remain. A Bleeping Computer report on a malicious package stealing WhatsApp accounts, published in December 2025, revealed how threats hide backdoors in seemingly innocuous libraries, as covered in their article. This diversity of attacks demands multifaceted defenses.

Evolving Threats and Future Safeguards

As 2025 drew to a close, reports of over 70 malicious npm and VS Code packages stealing data and crypto emerged, per a May 2025 The Hacker News piece. These incidents, combined with the phishing operation, paint a picture of an arms race between attackers and defenders. SecurityWeek’s coverage of an npm package with 56,000 downloads compromising WhatsApp credentials, in their December 2025 article, further emphasizes the personal risks to users.

Looking ahead, experts advocate for zero-trust models in software development, verifying every package regardless of source. Community efforts, such as those from the OpenSSF, aim to standardize malicious package reporting. Yet, the phishing campaign’s five-month undetected run, as initially reported by The Hacker News, serves as a stark reminder of the challenges.

Ultimately, fortifying npm and similar registries will require global cooperation. Developers must integrate security into their workflows, while registries enhance upload verifications. As threats grow more ingenious, staying ahead demands vigilance, innovation, and a commitment to securing the foundations of modern software.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us