Thursday for containing malicious code," reports ZDNet.
"According to advisories from the npm security team, the three
imported the packages into their projects."
The shells, a technical term used by cyber-security researchers,
allowed threat actors to connect remotely to the infected computer and
execute malicious operations. The npm security team said the shells
could work on both Windows and *nix operating systems, such as Linux,
FreeBSD, OpenBSD, and others.
All three packages were uploaded on the npm portal in May (first) and
September 2018 (last two). Each package had hundreds of downloads
since being uploaded on the npm portal. The packages names were:
"Any computer that has this package installed or running should be
considered fully compromised. All secrets and keys stored on that
computer should be rotated immediately from a different computer," the
npm security team said.'
-- source: https://it.slashdot.org/story/20/10/18/2321208
Dept. of Computer Science
University of Waikato, NZ
+64 (7) 577-5304