Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Programming Security AI

Over 3,200 Cursor Users Infected by Malicious Credential-Stealing npm Packages (thehackernews.com) 20

Cybersecurity researchers have flagged three malicious npm packages that target the macOS version of AI-powered code-editing tool Cursor, reports The Hacker News: "Disguised as developer tools offering 'the cheapest Cursor API,' these packages steal user credentials, fetch an encrypted payload from threat actor-controlled infrastructure, overwrite Cursor's main.js file, and disable auto-updates to maintain persistence," Socket researcher Kirill Boychenko said. All three packages continue to be available for download from the npm registry. "Aiide-cur" was first published on February 14, 2025...

In total, the three packages have been downloaded over 3,200 times to date.... The findings point to an emerging trend where threat actors are using rogue npm packages as a way to introduce malicious modifications to other legitimate libraries or software already installed on developer systems... "By operating inside a legitimate parent process — an IDE or shared library — the malicious logic inherits the application's trust, maintains persistence even after the offending package is removed, and automatically gains whatever privileges that software holds, from API tokens and signing keys to outbound network access," Socket told The Hacker News.

"This campaign highlights a growing supply chain threat, with threat actors increasingly using malicious patches to compromise trusted local software," Boychenko said.

The npm packages "restart the application so that the patched code takes effect," letting the threat actor "execute arbitrary code within the context of the platform."

Over 3,200 Cursor Users Infected by Malicious Credential-Stealing npm Packages

Comments Filter:
  • by Anonymous Coward
    I have no sympathy for these people.
    • ok but it just highlights the supply chain risks common to all of us. For now they target idiots ready to download "the cheapest API". But nothing prevents, in theory, that someone packages malicious code into a vi/vim/gvim package for a given distro. We can discuss risk factors, e.g. big vs small distro, yearly vs rolling release.

  • It's almost like one could see this coming. Toolchains have incredible vulnerabilities, especially npm and rust crates.
    • by Meneth ( 872868 )

      I suspect the general problem is letting third parties publish packages in official distribution without any review.

      Compare with Debian, where each package has a maintainer who's independent of that package's developer.

      Much slower, yes, but when you don't need the bleeding edge, that stability is worth a lot.

  • Why isn't that npm shit running in a container or VM? It sounds like the editor itself is implemented with npm packages. If that's the case, seems pretty stupid to run an editor like that to me. Maybe ask the AI to create a more secure setup for you.

    • by znrt ( 2424692 )

      npm has bad press because their repo is huge, very dynamic and not very well curated, and because a big portion of its users have little care or little clue. other than that it's exactly the same as any other dependency manager. npm, nuget, cargo, swift, pip, go mod, maven ... all of them load dependencies into your development environment in some way. how rigorously their repositories are curated makes a difference, but that only goes so far. indeed, ideally you would need a fresh container and a thorough

  • by Tony Isaac ( 1301187 ) on Sunday May 11, 2025 @07:26PM (#65369387) Homepage

    Like any new technology on the bleeding edge, the promises are stratospheric, but the risks are also high. Reality always has a way of showing up, the claims are never as dramatic as the proponents say they are. And the cataclysm from feared job losses is also never as dire.

    And I say that as a daily user of GitHub Copilot. It isn't as "advanced" as Cursor, in the sense that it's still just focusing on spot code changes, not trying to be your entire development system. In the context of stories like this, I see this as a good thing. It gives me the power of AI to speed up the pace of work, but also doesn't expose me to the same level of risk, since I still have to supervise closely.

    • The trick is to actually measure the promised hype instead of calling everything stratospheric. Yes every new technology is hyped up these days, but not every technology has the same amount of hype. The AI hype is 2 orders of magnitude bigger than any other technology hype created before. It does not serve, to imply it's all the same and par for the course.
    • The way I've been putting it is AI is going to end up filling the exact same role access databases did 15-20 years ago. A way to create a "good enough solution" for some small function in a business to get started that then rapidly approaches unsustainable as the technical debt starts to pile up and the fundamental limits of the technology start to show themselves. Then suddenly you need to start doing a "Business transition" that takes millions of dollars of developer time to clean up.

Pause for storage relocation.

Working...