Beyond the Radar: Join GigaOm and Cynet May 6th
Why Cynet
Our Valued Partners
Industry Validation
Platform
Solutions
Prevent, detect, and remediate threats automatically.
Detect and isolate suspicious traffic instantly.
Identify misconfigurations and risks before attackers do.
Block phishing and malicious attachments.
Extend protection to every device.
Stop credential theft and lateral movement.
Pre-built playbooks and automated workflows that reduce manual effort.
Partners
Resources
Resource Center
Company
Why Cynet
Our Valued Partners
Industry Validation
Platform
Solutions
Prevent, detect, and remediate threats automatically.
Detect and isolate suspicious traffic instantly.
Identify misconfigurations and risks before attackers do.
Block phishing and malicious attachments.
Extend protection to every device.
Stop credential theft and lateral movement.
Pre-built playbooks and automated workflows that reduce manual effort.
Partners
Resources
Resource Center
Company
Subscribe to get the latest updates and resources
This blog is part of an ongoing series examining the findings in the February 2026 Cyber Threat Intel Report from Cyops. Read the full report here.
Supply chain attacks are no longer edge-case scenarios reserved for nation-state threat briefings. February 2026’s threat data makes it unmistakably clear: attackers are embedding themselves directly into the tools your developers trust every day. If your organization relies on open-source packages (and virtually every modern development environment does) you need to act now.
Researchers uncovered a malicious NPM package called buildrunner-dev designed to mimic legitimate, abandoned packages with similar names — a classic typosquatting play targeting Windows developers. The attack chain is sophisticated and deliberate.
When a developer runs npm install, a hidden post-install script silently triggers a multi-stage infection. What makes this campaign stand out is its use of steganography: key malicious components — including an AMSI bypass and a .NET loader — are concealed within the RGB values of PNG images hosted on public platforms like ImgBB. Once active, the malware uses the fodhelper.exe UAC bypass to escalate privileges without triggering UAC prompts, establishes persistence via the Windows Startup folder, and ultimately deploys the Pulsar Remote Access Trojan (RAT) through process hollowing into legitimate Windows processes.
By the time your endpoint detects anything, the attacker has full control of the compromised system.
If one malicious package weren’t alarming enough, a new self-propagating NPM worm dubbed SANDWORM_MODE was also observed in February. Using typosquatting to impersonate popular utilities, the worm steals NPM tokens, GitHub tokens, environment variables, and cryptographic keys upon installation — then uses those stolen credentials to poison further repositories and continue spreading.
Known malicious packages include: claud-code@0.2.1, cloude-code@0.2.1, cloude@0.3.0, suport-color@0.1.1, veim@2.46.2, and others. This is a self-amplifying threat. Every compromised developer environment becomes a new vector.

The Notepad++ supply chain compromise — attributed to the state-sponsored Lotus Blossom threat group — adds another layer of urgency. Between June and December 2025, the group compromised Notepad++’s shared hosting infrastructure to intercept and redirect update server traffic, delivering Cobalt Strike beacons to unsuspecting users across cloud hosting, energy, financial, government, manufacturing, and software development sectors worldwide.
The fix: Notepad++ has since released version 8.9.1 with enhanced security mechanisms and migrated to a new hosting provider.
The threats outlined above require immediate action. For development and security teams:
The supply chain is one of the most reliable attack surfaces adversaries have precisely because defenders tend to trust it. That trust needs to be earned, verified, and continuously re-evaluated. Don’t wait for a breach to find out which packages you should have been watching.
Search results for: