Beyond the Radar: Join GigaOm and Cynet May 6th

Sandworm

Typosquatting, Steganography, and Worms: The February NPM Attack Wave

Subscribe to get the latest updates and resources

This blog is part of an ongoing series examining the findings in the February 2026 Cyber Threat Intel Report from Cyops. Read the full report here. 

Supply chain attacks are no longer edge-case scenarios reserved for nation-state threat briefings. February 2026’s threat data makes it unmistakably clear: attackers are embedding themselves directly into the tools your developers trust every day. If your organization relies on open-source packages (and virtually every modern development environment does) you need to act now.

Three Campaigns, One Urgent Message

The buildrunner-dev NPM Package

Researchers uncovered a malicious NPM package called buildrunner-dev designed to mimic legitimate, abandoned packages with similar names — a classic typosquatting play targeting Windows developers. The attack chain is sophisticated and deliberate.

By the time your endpoint detects anything, the attacker has full control of the compromised system.

The SANDWORM_MODE Worm

If one malicious package weren’t alarming enough, a new self-propagating NPM worm dubbed SANDWORM_MODE was also observed in February. Using typosquatting to impersonate popular utilities, the worm steals NPM tokens, GitHub tokens, environment variables, and cryptographic keys upon installation — then uses those stolen credentials to poison further repositories and continue spreading.

Known malicious packages include: claud-code@0.2.1, cloude-code@0.2.1, cloude@0.3.0, suport-color@0.1.1, veim@2.46.2, and others. This is a self-amplifying threat. Every compromised developer environment becomes a new vector.

Notepad++ infrastructure hacked by the State-sponsored threat group “Lotus Blossom”

The Notepad++ supply chain compromise — attributed to the state-sponsored Lotus Blossom threat group — adds another layer of urgency. Between June and December 2025, the group compromised Notepad++’s shared hosting infrastructure to intercept and redirect update server traffic, delivering Cobalt Strike beacons to unsuspecting users across cloud hosting, energy, financial, government, manufacturing, and software development sectors worldwide.

The fix: Notepad++ has since released version 8.9.1 with enhanced security mechanisms and migrated to a new hosting provider.

What You Need to Do Now

The threats outlined above require immediate action. For development and security teams:

  • Audit your package.json and package-lock.json files immediately and cross-reference against the known malicious SANDWORM_MODE package list.
  • Enforce package allowlisting and integrity verification in your CI/CD pipelines.
  • Implement behavioral monitoring on post-install scripts — these should never be executing network requests or launching shell commands silently.
  • Rotate NPM and GitHub tokens for any developer environments that may have had exposure.
  • Update Notepad++ to version 8.9.1 across all endpoints immediately.
  • Monitor for unsigned or anomalous DLL loads and process hollowing indicators on developer workstations.

The supply chain is one of the most reliable attack surfaces adversaries have precisely because defenders tend to trust it. That trust needs to be earned, verified, and continuously re-evaluated. Don’t wait for a breach to find out which packages you should have been watching.

Related Posts

How Vect Ransomware Is Rewriting the RaaS Affiliate Playbook
March 2026 Cyber Threat Intelligence: Vect, WhoUser, Reynolds Ransomware and More
Geopolitics, Cyber-Terrorism, and the Stryker Attack: What Happened and What Comes Next 
Emerging Threat: Microsoft Teams Vishing Campaign Continues 
Five Months, 1,600 Credentials, and Real-World Freight Fraud: Inside the Diesel Vortex Threat Actor Group

Keep Reading

Vect blog 2
sec-foundations-bg-4
Stryker BReach Image

Search results for: