Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Programming Security

Security Researchers Spot 150,000 Function-less npm Packages in Automated 'Token Farming' Scheme (theregister.com) 10

An anonymous reader shared this report from The Register: Yet another supply chain attack has hit the npm registry in what Amazon describes as "one of the largest package flooding incidents in open source registry history" — but with a twist. Instead of injecting credential-stealing code or ransomware into the packages, this one is a token farming campaign.

Amazon Inspector security researchers, using a new detection rule and AI assistance, originally spotted the suspicious npm packages in late October, and, by November 7, the team had flagged thousands. By November 12, they had uncovered more than 150,000 malicious packages across "multiple" developer accounts. These were all linked to a coordinated tea.xyz token farming campaign, we're told. This is a decentralized protocol designed to reward open-source developers for their contributions using the TEA token, a utility asset used within the tea ecosystem for incentives, staking, and governance.

Unlike the spate of package poisoning incidents over recent months, this one didn't inject traditional malware into the open source code. Instead, the miscreants created a self-replicating attack, infecting the packages with code to automatically generate and publish, thus earning cryptocurrency rewards on the backs of legitimate open source developers. The code also included tea.yaml files that linked these packages to attacker-controlled blockchain wallet addresses.

At the moment, Tea tokens have no value, points out CSO Online. "But it is suspected that the threat actors are positioning themselves to receive real cryptocurrency tokens when the Tea Protocol launches its Mainnet, where Tea tokens will have actual monetary value and can be traded..." In an interview on Friday, an executive at software supply chain management provider Sonatype, which wrote about the campaign in April 2024, told CSO that number has now grown to 153,000. "It's unfortunate that the worm isn't under control yet," said Sonatype CTO Brian Fox. And while this payload merely steals tokens, other threat actors are paying attention, he predicted. "I'm sure somebody out there in the world is looking at this massively replicating worm and wondering if they can ride that, not just to get the Tea tokens but to put some actual malware in there, because if it's replicating that fast, why wouldn't you?"

When Sonatype wrote about the campaign just over a year ago, it found a mere 15,000 packages that appeared to come from a single person. With the swollen numbers reported this week, Amazon researchers wrote that it's "one of the largest package flooding incidents in open source registry history, and represents a defining moment in supply chain security...." For now, says Sonatype's Fox, the scheme wastes the time of npm administrators, who are trying to expel over 100,000 packages. But Fox and Amazon point out the scheme could inspire others to take advantage of other reward-based systems for financial gain, or to deliver malware.

After deplooying a new detection rule "paired with AI", Amazon's security researchers' write, "within days, the system began flagging packages linked to the tea.xyz protocol... By November 7, the researchers flagged thousands of packages and began investigating what appeared to be a coordinated campaign. The next day, after validating the evaluation results and analyzing the patterns, they reached out to OpenSSF to share their findings and coordinate a response.
Their blog post thanks the Open Source Security Foundation (OpenSSF) for rapid collaboration, while calling the incident "a defining moment in supply chain security..."

Security Researchers Spot 150,000 Function-less npm Packages in Automated 'Token Farming' Scheme

Comments Filter:
  • by SlashbotAgent ( 6477336 ) on Sunday November 16, 2025 @11:31AM (#65798863)

    NPM, PowerShell Gallery, Docker Hub... People have been just blindly downloading and executing form these repos for years. I'm absolutely amazed that there hasn't been infinitely more breaches and malware than there seem to be.

  • by Todd Knarr ( 15451 ) on Sunday November 16, 2025 @11:36AM (#65798865) Homepage

    This sort of attack is inevitable when you have open-access software repositories. If anybody can upload a package, that implies any bad guy can upload a package. So:

    • Ask yourself if you really need a package for this, or is it simple or straightforward enough you can code it yourself and avoid the dependency and the associated supply-chain risks.
    • Do your research. Don't just grab the first package that looks like it fits your needs. Review all of the results, then look at who published them and look them up on the web. Look at their web site. Look at what other packages they've published. Look at how active they are aside from the package you're looking at. Toss any that have red flags like no history aside from this package.
    • Validate your packages. Authors often sign packages. If they do, get their keys and enable validation so you only accept packages signed by the author you know. That way if a package gets hijacked it'll fail the signature check.
    • Re:Do your research (Score:4, Interesting)

      by Zocalo ( 252965 ) on Sunday November 16, 2025 @11:53AM (#65798897) Homepage
      It's not just about the packages and whether they are malicious or not. These, so far at least, are not - AFAICT they don't even *claim* do anything at all that is functionally useful to a coder so they are never going to get downloaded; their sole purpose is to earn the uploader some of these TEA tokens which, when amalgamated across a few hundred thousand packages, is presumably worth something to them, or why bother? Now that the jig is up, the people that do like to peddle such malware are probably not looking too kindly on whoever pulled this off.

      That's the secondary issue here ; like many similar things, whoever came up with this TEA token either didn't consider, or didn't care about, human nature. Anyone with half a clue, or the slightest care about the integrity of such a scheme, should be well aware by now that if you can earn something of value (which need not be monetary) by doing some online clicks, likes, shares, uploads, or whatever then some asshat is going to try and exploit the system so they can get all the benefits without the effort. If your system isn't baking in countermeasures against that kind of abuse, then it's a PoS that should never have left the drawing board but, all too often, human nature rears its head again and says "ship it anyway!" and the enshitification continues.
      • "do anything at all that is functionally useful " except get the framework for nastyness installed as widely as possible for resale to the threat actor.

Men take only their needs into consideration -- never their abilities. -- Napoleon Bonaparte

Working...