A previously unknown threat actor has been discovered using malicious npm packages to target developers and steal source code and configuration files from their machines    . This campaign has been ongoing since 2021  , with the threat actor continuously publishing these malicious packages  .
The packages are designed to execute post-installation and exfiltrate valuable information to a remote server . Each package consists of three files: package.json, preinstall.js , and index.js . Upon installation , a post-install hook triggers the preinstall.js script , which then initiates the index.js script . This script collects system information and sends it to a remote server . The packages are associated with the cryptocurrency sector and are authored by “lexi2”.
The attack involves creating a ZIP archive of the stolen data and transmitting it to an FTP server . Security researcher Yehuda Gelb emphasizes that these attacks are not isolated incidents  , but rather the work of persistent adversaries  . Researchers stress the importance of sharing metadata and tracking attackers for ongoing monitoring and analysis to develop a more sophisticated strategy for protection against these threats.
The discovery of this threat highlights the need for enhanced software supply chain security. It is crucial for developers to remain vigilant and implement robust security measures to protect their source code and configuration files. Ongoing monitoring and analysis , along with sharing metadata and tracking attackers , are essential for developing a more sophisticated strategy to mitigate these threats. The report by the software supply chain security firm Checkmarx serves as a valuable resource in understanding and addressing this threat.