{"id":6526,"date":"2025-12-29T10:12:18","date_gmt":"2025-12-29T10:12:18","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/12\/29\/27-malicious-npm-packages-used-as-phishing-infrastructure-to-steal-login-credentials\/"},"modified":"2025-12-29T10:12:18","modified_gmt":"2025-12-29T10:12:18","slug":"27-malicious-npm-packages-used-as-phishing-infrastructure-to-steal-login-credentials","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/12\/29\/27-malicious-npm-packages-used-as-phishing-infrastructure-to-steal-login-credentials\/","title":{"rendered":"27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials"},"content":{"rendered":"<p>\u200bCybersecurity researchers have disclosed details of what has been described as a &#8220;sustained and targeted&#8221; spear-phishing campaign that has published over two dozen packages to the npm registry to facilitate credential theft.<br \/>\nThe activity, which involved uploading 27 npm packages from six different npm aliases, has primarily targeted sales and commercial personnel at critical\u00a0Cybersecurity researchers have disclosed details of what has been described as a &#8220;sustained and targeted&#8221; spear-phishing campaign that has published over two dozen packages to the npm registry to facilitate credential theft.<br \/>\nThe activity, which involved uploading 27 npm packages from six different npm aliases, has primarily targeted sales and commercial personnel at critical\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have disclosed details of what has been described as a &#8220;sustained and targeted&#8221; spear-phishing campaign that has published over two dozen packages to the npm registry to facilitate credential theft. The activity, which involved uploading 27 npm packages from six different npm aliases, has primarily targeted sales and commercial personnel at critical\u00a0Cybersecurity researchers&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/12\/29\/27-malicious-npm-packages-used-as-phishing-infrastructure-to-steal-login-credentials\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":6527,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6526"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=6526"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6526\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/6527"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=6526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=6526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=6526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}