Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Three versions of the widely used node-ipc npm package (9.1.6, 9.2.3, 12.0.1) were compromised following an account takeover and are actively stealing credentials from any system that installed them. The malicious code harvests cloud provider keys, CI/CD secrets, container credentials, SSH keys, and browser tokens, then exfiltrates them via DNS tunneling, a method that bypasses most conventional network monitoring. With roughly 690,000 weekly downloads, any organization running Node.js build pipelines, CI/CD systems, or applications with node-ipc as a direct or transitive dependency faces material risk of credential theft and downstream cloud infrastructure compromise.

Author

Tech Jacks Solutions