Back to Wire
CanisterWorm Malware Targets Namastex.ai NPM Packages, Stealing Developer Credentials
Security

CanisterWorm Malware Targets Namastex.ai NPM Packages, Stealing Developer Credentials

Source: Socket Original Author: Socket Research Team 2 min read Intelligence Analysis by Gemini

Sonic Intelligence

00:00 / 00:00
Signal Summary

New CanisterWorm malware variant compromises Namastex.ai NPM packages, stealing developer secrets.

Explain Like I'm Five

"Imagine you download a game, but inside it, there's a sneaky spy program that steals your secret passwords and money details from your computer. This spy program then tries to spread to other games. That's what happened here with some computer code tools, and it's a big problem for people who make computer programs."

Original Reporting
Socket

Read the original article for full context.

Read Article at Source

Deep Intelligence Analysis

A new variant of the sophisticated CanisterWorm malware, linked to the TeamPCP threat group, has compromised NPM packages associated with Namastex.ai, directly targeting developer environments. This attack leverages advanced supply chain tactics to steal critical credentials and sensitive data, posing a severe threat to the integrity of AI development workflows and broader software infrastructure. The malware's core methods include install-time execution, credential theft, off-host exfiltration, and self-propagation, utilizing an Internet Computer Protocol (ICP) canister for command and control, indicating a high level of adversarial sophistication.

The attack specifically targets a wide array of sensitive information. It harvests environment variables commonly associated with secrets, tokens, cloud providers (AWS, Azure, GCP), CI/CD systems, and LLM platforms. Furthermore, it attempts to access high-value local files such as .npmrc, SSH keys, .git-credentials, and cloud configuration files. Critically, the payload also targets browser login storage and crypto-wallet data from applications like MetaMask, Phantom, Solana, Ethereum, and Bitcoin wallets. The exfiltration occurs via both a conventional HTTPS webhook and a hardcoded ICP canister endpoint, demonstrating a multi-channel data egress strategy. Affected packages, including @automagik/genie (6,744 weekly downloads) and pgserve (1,300 weekly downloads), highlight a focus on specialized developer tools.

This incident underscores the critical and persistent vulnerabilities within the software supply chain, particularly for developer-centric tools that are foundational to modern AI and software development. The use of advanced C2 infrastructure and self-propagation logic suggests an escalating sophistication in threat actor capabilities, demanding enhanced security protocols, continuous vigilance, and robust supply chain integrity checks from developers and platform providers. The compromise of AI-focused tooling could lead to broader systemic risks if stolen credentials are used to access or manipulate AI models, data, or critical infrastructure, necessitating an industry-wide re-evaluation of security postures.
AI-assisted intelligence report · EU AI Act Art. 50 compliant

Visual Intelligence

flowchart LR
    A[Malicious NPM Package] --> B[Install-Time Execution]
    B --> C[Harvest Secrets]
    C --> D[Target Browser Data]
    D --> E[Target Wallet Data]
    E --> F[Exfiltrate Data Webhook]
    E --> G[Exfiltrate Data ICP Canister]
    F --> H[C2 Server]
    G --> H

Auto-generated diagram · AI-interpreted flow

Impact Assessment

This incident highlights persistent and sophisticated software supply chain vulnerabilities, particularly within developer tools and the AI ecosystem. The theft of credentials and sensitive data poses a significant risk of further system compromise and intellectual property theft.

Key Details

  • The malware uses install-time execution, credential theft, off-host exfiltration, canister-backed C2, and self-propagation logic.
  • An explicit code reference to a TeamPCP/LiteLLM method was found within the malicious payload.
  • Affected packages are tied to Namastex Labs (Namastex.ai), including @automagik/genie (6,744 weekly downloads) and pgserve (1,300 weekly downloads).
  • The malware harvests sensitive environment variables, including .npmrc, SSH keys, cloud credentials (AWS, Azure, GCP), Kubernetes/Docker config, and database passwords.
  • It targets browser and crypto-wallet data, specifically Chrome login storage, MetaMask, Phantom, Solana, Ethereum, Bitcoin, Exodus, and Atomic Wallet files.
  • Stolen data is exfiltrated to `https://telemetry.api-monitor[.]com/v1/telemetry` and an ICP canister endpoint with ID `cjn37-uyaaa-aaaac-qgnva-cai`.

Optimistic Outlook

Rapid identification and detailed analysis of this sophisticated CanisterWorm variant can lead to enhanced supply chain security protocols and improved detection mechanisms across the developer ecosystem. This proactive response strengthens defenses against future, similar attacks.

Pessimistic Outlook

The use of advanced techniques like canister-backed command and control and self-propagation logic indicates evolving threat actor capabilities. This could lead to more widespread, harder-to-detect supply chain compromises, posing a continuous and escalating risk to critical development infrastructure.

Stay on the wire

Get the next signal in your inbox.

One concise weekly briefing with direct source links, fast analysis, and no inbox clutter.

Free. Unsubscribe anytime.

Continue reading

More reporting around this signal.

Related coverage selected to keep the thread going without dropping you into another card wall.