MITRE ATT&CK 2025 Results are LIVE

Get a Demo
Sandworm

Typosquatting, Steganography, and Worms: The February NPM Attack Wave

Subscribe to get the latest updates and resources

This blog is part of an ongoing series examining the findings in the February 2026 Cyber Threat Intel Report from Cyops. Read the full report here. 

Supply chain attacks are no longer edge-case scenarios reserved for nation-state threat briefings. February 2026’s threat data makes it unmistakably clear: attackers are embedding themselves directly into the tools your developers trust every day. If your organization relies on open-source packages (and virtually every modern development environment does) you need to act now.

Three Campaigns, One Urgent Message

The buildrunner-dev NPM Package

Researchers uncovered a malicious NPM package called buildrunner-dev designed to mimic legitimate, abandoned packages with similar names — a classic typosquatting play targeting Windows developers. The attack chain is sophisticated and deliberate.

By the time your endpoint detects anything, the attacker has full control of the compromised system.

The SANDWORM_MODE Worm

If one malicious package weren’t alarming enough, a new self-propagating NPM worm dubbed SANDWORM_MODE was also observed in February. Using typosquatting to impersonate popular utilities, the worm steals NPM tokens, GitHub tokens, environment variables, and cryptographic keys upon installation — then uses those stolen credentials to poison further repositories and continue spreading.

Known malicious packages include: claud-code@0.2.1, cloude-code@0.2.1, cloude@0.3.0, suport-color@0.1.1, veim@2.46.2, and others. This is a self-amplifying threat. Every compromised developer environment becomes a new vector.

Notepad++ infrastructure hacked by the State-sponsored threat group “Lotus Blossom”

The Notepad++ supply chain compromise — attributed to the state-sponsored Lotus Blossom threat group — adds another layer of urgency. Between June and December 2025, the group compromised Notepad++’s shared hosting infrastructure to intercept and redirect update server traffic, delivering Cobalt Strike beacons to unsuspecting users across cloud hosting, energy, financial, government, manufacturing, and software development sectors worldwide.

The fix: Notepad++ has since released version 8.9.1 with enhanced security mechanisms and migrated to a new hosting provider.

What You Need to Do Now

The threats outlined above require immediate action. For development and security teams:

  • Audit your package.json and package-lock.json files immediately and cross-reference against the known malicious SANDWORM_MODE package list.
  • Enforce package allowlisting and integrity verification in your CI/CD pipelines.
  • Implement behavioral monitoring on post-install scripts — these should never be executing network requests or launching shell commands silently.
  • Rotate NPM and GitHub tokens for any developer environments that may have had exposure.
  • Update Notepad++ to version 8.9.1 across all endpoints immediately.
  • Monitor for unsigned or anomalous DLL loads and process hollowing indicators on developer workstations.

The supply chain is one of the most reliable attack surfaces adversaries have precisely because defenders tend to trust it. That trust needs to be earned, verified, and continuously re-evaluated. Don’t wait for a breach to find out which packages you should have been watching.

Related Posts

February 2026 Cyber Threat Intelligence Roundup: What Security Teams Need to Know This Month
The Helpful Support Agent Scam: How Attackers Are Exploiting Microsoft Teams
The Invisible Intruder: Living Off the Land After a FortiGate Exploit 
Token to Takeover: Inside a Real-World Microsoft Entra ID ITDR Investigation
ECHO Findings: Data Exfiltration and The Quiet Evolution of Ransomware 

Keep Reading

blog-bg-threat
Teams Remote Access
Living off the land

Search results for: