Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Firmware-Managed Verified Boot with Hardware, Building Trust From Power-On

    July 16, 2025

    Scientists discover the moment AI truly understands language

    July 16, 2025

    Zero Trust Explained: Why Traditional

    July 16, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Supply chain attack hits Gluestack NPM packages with 960K weekly downloads
    IT/ Cybersecurity

    Supply chain attack hits Gluestack NPM packages with 960K weekly downloads

    big tee tech hubBy big tee tech hubJune 8, 2025003 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Supply chain attack hits Gluestack NPM packages with 960K weekly downloads
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Supply chain attack hits Gluestack NPM packages with 960K weekly downloads

    A significant supply chain attack hit NPM after 16 popular Gluestack ‘react-native-aria’ packages with over 950,000 weekly downloads were compromised to include malicious code that acts as a remote access trojan (RAT).

    BleepingComputer determined that the compromise began on June 6 at 4:33 PM EST, when a new version of the react-native-aria/focus package was published to NPM. Since then, 16 of the 20 Gluestack react-native-aria packages have been compromised on NPM, with the threat actors publishing a new version as recently as two hours ago.

    Ongoing compromise of NPM packages
    Ongoing compromise of NPM packages
    Source: BleepingComputer

    The supply chain attack was discovered by cybersecurity firm Aikido Security, who discovered obfuscated code injected into the lib/index.js file for the following packages:


















    Package Name Version Weekly Downloads
    react-native-aria/button 0.2.11 51,000
    react-native-aria/checkbox 0.2.11 81,000
    react-native-aria/combobox 0.2.10 51,000
    react-native-aria/disclosure 0.2.9 3
    react-native-aria/focus 0.2.10 100,000
    react-native-aria/interactions 0.2.17 125,000
    react-native-aria/listbox 0.2.10 51,000
    react-native-aria/menu 0.2.16 22,000
    react-native-aria/overlays 0.3.16 96,000
    react-native-aria/radio 0.2.14 78,000
    react-native-aria/switch 0.2.5 477
    react-native-aria/toggle 0.2.12 81,000
    react-native-aria/utils 0.2.13 120,000
    gluestack-ui/utils 0.1.17 55,000
    react-native-aria/separator 0.2.7 65
    react-native-aria/slider 0.2.13 51,000

    These packages are very popular, with approximately 960,000 weekly downloads, making this a supply chain attack that could have widespread consequences.

    The malicious code is heavily obfuscated and is appended to the last line of source code in the file, padded with many spaces, so it’s not easily spotted when using the code viewer on the NPM site.

    Malicious code added to end of index.js file
    Malicious code added to end of index.js file
    Source: BleepingComputer

    Aikido told BleepingComputer that the malicious code is nearly identical to a remote access trojan in another NPM compromise they discovered last month.

    The researcher’s analysis of the previous campaign explains that the remote access trojan will connect to the attackers’ command and control server and receive commands to execute.

    These commands include:

    • cd – Change current working directory
    • ss_dir – Reset directory to script’s path
    • ss_fcd: – Force change directory to
    • ss_upf:f,d – Upload single file f to destination d
    • ss_upd:d,dest – Upload all files under directory d to destination dest
    • ss_stop – Sets a stop flag to interrupt current upload process
    • Any other input – Treated as a shell command, executed via child_process.exec()

    The trojan also performs Windows PATH hijacking by prepending a fake Python path (%LOCALAPPDATA%\Programs\Python\Python3127) to the PATH environment variable, allowing the malware to silently override legitimate python or pip commands to execute malicious binaries.

    Aikido sercurity researcher Charlie Eriksen has attempted to contact Gluestack about the compromise by creating GitHub issues on each of the project’s repositories, but there has not been any response at this time.

    “No response from package maintainers (it’s morning on a saturday in the US which is prob exactly why its happening now),” Arkido told BleepingComputer.

    “NPM we have contacted and reported each package, this is a process that usually takes multiple days for NPM to address though.”

    Aikido also attributes this attack to the same threat actors who compromised four other NPM packages earlier this week named biatec-avm-gas-station, cputil-node, lfwfinance/sdk, and lfwfinance/sdk-dev.

    BleepingComputer reached out to Gluestack about the compromised packages but has not received a reply at this time.


    Tines Needle

    Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

    In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work — no complex scripts required.



    Source link

    960K Attack chain downloads Gluestack hits npm packages Supply Weekly
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Zero Trust Explained: Why Traditional

    July 16, 2025

    Anomaly detection betrayed us, so we gave it a new job – Sophos News

    July 15, 2025

    AWS Weekly Roundup: AWS Builder Center, Amazon Q, Oracle Database@AWS, and more (July 14, 2025)

    July 15, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Firmware-Managed Verified Boot with Hardware, Building Trust From Power-On

    July 16, 2025

    Scientists discover the moment AI truly understands language

    July 16, 2025

    Zero Trust Explained: Why Traditional

    July 16, 2025

    Running high-performance PostgreSQL on Azure Kubernetes Service

    July 16, 2025
    Advertisement
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Firmware-Managed Verified Boot with Hardware, Building Trust From Power-On

    July 16, 2025

    Scientists discover the moment AI truly understands language

    July 16, 2025

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2025 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.