Socket’s Threat Research Team has uncovered two highly dangerous npm packages — express-api-sync and system-health-sync-api — that are capable of wiping entire production systems. Disguised as helpful utility tools, these packages were published under the npm alias "botsailer" and used an email ID linked to suspicious activity. Instead of delivering the promised synchronization or health check features, they contain hidden backdoors. These backdoors are triggered remotely, allowing attackers to execute destructive commands like rm -rf ** on Unix systems or rd /s /q . on Windows, resulting in the total deletion of source code, configuration files, and local databases. What makes this attack unique is its shift from traditional goals like data theft or crypto mining to complete sabotage. The threat actors behind these packages demonstrate a high level of intent, potentially driven by motives such as competitive disruption or state-sponsored activities. These malicious tools collect system details, use hardcoded credentials to communicate with an attacker-controlled email server, and create multiple redundant endpoints for triggering the destruction. Their ability to adapt commands based on the operating system and hide errors during execution indicates a sophisticated and calculated attack designed to bypass detection. To counter such threats, developers and organizations must adopt behavioral analysis tools capable of detecting unusual or malicious runtime activity in dependencies. Relying solely on popularity or package descriptions is no longer safe. Rigorous auditing, supply chain security practices, and proactive monitoring of open-source packages are essential to protect production environments from similar sabotage attacks in the future.
A sophisticated phishing campaign is targeting Spanish speaking users across Latin America and Europe, aiming to deploy Windows banking malware such as Casbaneiro (also known as Me...
Cisco is currently managing a major cybersecurity incident involving unauthorized access to its internal development networks. Threat actors reportedly breached the environment and...
A security flaw has been identified in the Vim text editor that allows attackers to execute arbitrary operating system commands through maliciously crafted files. The vulnerability...