Cyber Security

New NPM threats can eliminate production systems with one request

Essentially, the code listens to a request containing the hardcoded key “Default_123” and executes a destructive RM-RF* command upon triggering, deleting everything in the application root directory.

Pandya added that the second package is the system-hygienic synthesis API, which is more secretive and refined. Disguised as a system monitoring tool, collects environment and system data, and reveals multiple undocumented HTTP endpoints, such as /rmm-rf-me and /destrot /destain-best-host. When hit, the system break command will be executed when hit.

The malicious monitoring package can also use hard-coded SMTP credentials to delete execution details (such as hostname, IP, CWD, environment hash) via email, allowing an attacker to track successful deployments.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button