Malicious NPM Packages Used in Sophisticated Developer Cyberattack

Malicious NPM Packages Used in Sophisticated Developer Cyberattack

In October 2025, security researchers uncovered an unprecedented phishing campaign that weaponizes the npm ecosystem—not by infecting developers during package installation, but by abusing the unpkg.com CDN as a disposable hosting platform for malicious JavaScript.

By seeding over 175 throwaway npm packages, attackers have turned a trusted open source delivery network into a large-scale phishing infrastructure targeting enterprise employees across Europe’s industrial, technology, and energy sectors.

Rather than embedding malware in popular modules, adversaries created hundreds of ephemeral packages matching the pattern redirect-[a-z0-9]{6}.

Each package contains a minimal JavaScript file named beamglea.js and crafted HTML “business document” lures. When a victim opens one of these HTML files in a browser, it automatically loads the malicious script directly from unpkg.com via a tag such as:

xml