Philipp Burckhardt
burckhap.bsky.social
Philipp Burckhardt
@burckhap.bsky.social
⚡Securing Software Supply Chains @SocketSecurity (http://socket.dev)
🔭 Scientific computing for the web via @stdlibjs (http://stdlib.io)
Given an ongoing PyPI phishing campaign that continues to target users with new domains through legitimate-looking emails requesting "email verification" that actually steal credentials, we are on the lookout for any compromised packages in the PyPI ecosystem specifically.
September 26, 2025 at 10:44 PM
Two malicious Rust crates (faster_log and async_println) impersonated the popular fast_log library to steal Solana and Ethereum wallet keys from source code. Downloaded 8,424 times before removal, these packages scanned developer files for private keys and exfiltrated them to a C2 server.
Crates.io
September 26, 2025 at 10:44 PM
QR Code Steganography in npm: We discovered fezbox, a malicious npm package using an innovative steganographic technique for obfuscation - hiding malware inside a QR code! The package fetches a QR code from a remote URL and executes code hidden within it to steal browser credentials.
September 26, 2025 at 10:44 PM
We found hidden functionality in 28+ npm packages that disables UI for Russian-language users visiting .ru or .by domains. No CVEs. No advisories. No documentation. Just behavior-based disruption quietly copied into packages and shipped to production.
Read more: socket.dev/blog/protest...
Tracking Protestware Spread: 28 npm Packages Affected by Pay...
Undocumented protestware found in 28 npm packages disrupts UI for Russian-language users visiting Russian and Belarusian domains.
socket.dev
July 16, 2025 at 8:13 PM
The latest North Korean "Contagious Interview" wave includes 67 new malicious packages with a previously unknown malware loader, accumulating over 17,000 downloads.
Read more on out blog: socket.dev/blog/contagi...
July 16, 2025 at 8:13 PM
These packages, disguised as "the cheapest Cursor API," install backdoors that steal credentials and modify crucial files. sw-cur, sw-cur1, and aiide-cur have been downloaded 3,200+ times before discovery.
Read about them on the Socket blog:
socket.dev/blog/malicio...
Backdooring the IDE: Malicious npm Packages Hijack Cursor Ed...
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor a...
socket.dev
May 8, 2025 at 5:32 PM
🚨 With vibe coding being on everyone's minds and AI code generations seemingly becoming ubiquitous, it is not surprising that this attracts also malicious actors. Kirill Boychenko uncovered three malicious npm packages targeting Cursor users on macOS.
May 8, 2025 at 5:32 PM
The attack was comprised of three malicious modules with hidden destructive code, using array-based string obfuscation and dynamic payload execution, targeting Linux servers and dev environments.

Check our full technical analysis and protection tips:

socket.dev/blog/wget-to...

#CyberSecurity
wget to Wipeout: Malicious Go Modules Fetch Destructive Payl...
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
socket.dev
May 1, 2025 at 7:56 PM
The threat actor started publishing these packages in 2021, consistently employing comparable strategies while remaining undetected.

Full technical analysis here:
socket.dev/blog/using-t...
Using Trusted Protocols Against You: Gmail as a C2 Mechanism...
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.
socket.dev
April 30, 2025 at 8:33 PM
These packages use embedded credentials to connect to Gmail's SMTP server, relay signals to emails under the control of attackers, and initiate WebSocket connections that can bypass firewalls since the connection starts from within the network.
Using Trusted Protocols Against You: Gmail as a C2 Mechanism...
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.
socket.dev
April 30, 2025 at 8:33 PM
Remember: If any code asks for your seed phrase, there's no salvation - it's not a feature, it's a scam.
Here's the complete write-up: socket.dev/blog/malicio...
The Bad Seeds: Malicious npm and PyPI Packages Pose as Devel...
Socket researchers uncovered malicious npm and PyPI packages that steal crypto wallet credentials using Google Analytics and Telegram for exfiltration...
socket.dev
April 23, 2025 at 7:08 PM
With over 8,000 combined downloads, these digital highwaymen use Google Analytics and Telegram for exfiltration - truly where the wild roses grow.
While Socket is celebrating our launch week and Coana acquisition, the bad actors never take a break.
April 23, 2025 at 7:08 PM
What makes these attacks concerning is that they

target business-critical workflows
use sophisticated disguises that implement legitimate functionality
execute at specific runtime events, not installation

The malicious packages have been reported and are meanwhile removed from the npm registry.
April 20, 2025 at 10:52 PM
The second attack involves an npm package disguised as an Advcash payment integration that triggers a reverse shell during payment success callbacks, allowing attackers to gain control of servers processing transactions.

Read more about it here: socket.dev/blog/npm-pac...
Malicious npm Package Disguised as Advcash Integration Trigg...
The Socket Research Team investigates a malicious npm package that appears to be an Advcash integration but triggers a reverse shell during payment su...
socket.dev
April 20, 2025 at 10:52 PM
The first attack targets Telegram bot developers with typosquatted packages (node-telegram-utils, node-telegram-bots-api, node-telegram-util) that install persistent SSH backdoors on Linux machines, masquerading as the legitimate node-telegram-bot-api library (4.17M+ downloads).
April 20, 2025 at 10:52 PM