Home / Companies / Socket / Blog / Post Details
Content Deep Dive

Spearphishing Campaign Abuses npm Registry to Target U.S. and Allied Manufacturing and Healthcare Organizations

Blog post from Socket

Post Details
Company
Date Published
Author
Nicholas Anderson and Kirill Boychenko
Word Count
2,631
Language
English
Hacker News Points
-
Summary

The Socket Threat Research Team uncovered a targeted phishing campaign exploiting the npm registry to host and distribute malicious packages designed to mimic secure document-sharing workflows and Microsoft sign-in pages, targeting sales and commercial personnel in critical infrastructure sectors across the U.S. and allied nations. Over a span of five months, 27 malicious npm packages were identified, all utilizing browser-executed phishing components with client-side defenses to evade analysis, redirecting victims to threat actor-controlled infrastructure for credential harvesting. The operation, distinct from previous campaigns such as Beamglea, uses npm as a hosting platform to deploy self-contained phishing flows that modify page content with embedded HTML and JavaScript, incorporating anti-analysis measures like bot detection and honeypot fields. The campaign focuses on individuals in manufacturing, industrial automation, and healthcare sectors, potentially identified through trade show directories and publicly available information, and leverages adversary-in-the-middle (AiTM) infrastructure to capture session cookies, undermining traditional MFA security measures. The Socket team has reported the activity to npm security and notified affected organizations to aid in triage and mitigation, recommending enhanced monitoring and security measures to counter the persistent threat of npm-hosted phishing infrastructure.