Skip to content

MALICIOUS (1) campaign cataloged at 2026-04-30(2).

  1. The campaign has clearly malicious intent, like infostealers.
  2. This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.

2026-04-compr-lightning

Compromised versions contain injected code that starts automatically during importing the module, downloads (legitimate) JavaScript runtime, and executes included JavaScript infostealer. It collects credentials from multiple sources (e.g. files, process memory, cloud metadata endpoints, CLI commands like gh or gcloud), sensitive cryptocurrency data, shell history files. It also attempts to spread itself using discovered credentials to other repositories and packages.

Abuse categories

compromised-package

Campaign uses compromised-package.

exfiltration_credentials

The package attempts to steal credentials, like passwords or API keys.

exfiltration_crypto

The package attempts to steal sensitive cryptocurrency-related data, like wallet keys.

exfiltration_ssh_keys

Campaign uses exfiltration_ssh_keys.

files_exfiltration

Campaign uses files_exfiltration.

infostealer

Activity is typical for information stealers, i.e. by exfiltrate various sensitive data from the victim's environment.

References

Referenced resources may include blog posts about the campaign, malware analysis, sandbox reports, or other relevant information.

Packages in the campaign

campaign:2026-04-compr-lightning