mal-2026-1529
Vulnerability from ossf_malicious_packages
The package 'require-in-package' is part of the PhantomRaven supply chain attack campaign (Wave 2). It uses a Remote Dynamic Dependency (RDD) technique: the published package appears benign but includes a URL-based dependency in package.json pointing to an attacker-controlled C2 server (npm.jpartifacts.com). During npm install, npm automatically fetches a malicious tarball from the C2. The tarball preinstall hook executes a 259-line payload that harvests developer emails from .gitconfig, .npmrc, and environment variables; collects CI/CD tokens from GitHub Actions, GitLab CI, Jenkins, and CircleCI; fingerprints the host system; and exfiltrates all data to http://npm.jpartifacts.com/jpd.php via redundant HTTP GET, POST, and WebSocket channels with no visible terminal output. The campaign was first disclosed by Koi Security in October 2025 (Wave 1) and extended across Waves 2-4 between November 2025 and February 2026. Full analysis: https://www.endorlabs.com/learn/return-of-phantomraven
Any developer or CI/CD system that installed this package should be considered compromised. All secrets, tokens, and credentials accessible from that environment should be rotated immediately from a separate, unaffected machine.
-= Per source details. Do not edit below this line.=-
Source: amazon-inspector (1293b17080027d6e0ecdaeaa6711e46547d85691c2d8215ade57a6a472870f20)
The package require-in-package was found to contain malicious code.
Source: ghsa-malware (3268b9b7f0cfc4236262fc51a7d53987b2af93819a85ac969e6a58de41370b6b)
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
{
"affected": [
{
"database_specific": {
"cwes": [
{
"cweId": "CWE-506",
"description": "The product contains code that appears to be malicious in nature.",
"name": "Embedded Malicious Code"
},
{
"cweId": "CWE-506",
"description": "Embedded Malicious Code",
"name": "Embedded Malicious Code"
}
]
},
"package": {
"ecosystem": "npm",
"name": "require-in-package"
},
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "SEMVER"
},
{
"events": [
{
"introduced": "9.9.1"
}
],
"type": "SEMVER"
}
],
"versions": [
"9.9.1"
]
}
],
"aliases": [
"GHSA-5xq6-c5wc-f6x9"
],
"credits": [
{
"contact": [
"actran@amazon.com"
],
"name": "Amazon Inspector",
"type": "FINDER"
}
],
"database_specific": {
"iocs": {
"domains": [
"npm.jpartifacts.com"
],
"urls": [
"http://npm.jpartifacts.com/jpd.php"
]
},
"malicious-packages-origins": [
{
"id": "GHSA-5xq6-c5wc-f6x9",
"import_time": "2026-03-18T04:54:23.389511032Z",
"modified_time": "2026-03-18T03:59:52Z",
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"sha256": "3268b9b7f0cfc4236262fc51a7d53987b2af93819a85ac969e6a58de41370b6b",
"source": "ghsa-malware"
},
{
"import_time": "2026-03-23T05:14:40.432447417Z",
"modified_time": "2026-03-23T05:11:41Z",
"ranges": [
{
"events": [
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"sha256": "1293b17080027d6e0ecdaeaa6711e46547d85691c2d8215ade57a6a472870f20",
"source": "amazon-inspector"
}
]
},
"details": "The package \u0027require-in-package\u0027 is part of the PhantomRaven supply chain attack campaign (Wave 2). It uses a Remote Dynamic Dependency (RDD) technique: the published package appears benign but includes a URL-based dependency in package.json pointing to an attacker-controlled C2 server (npm.jpartifacts.com). During npm install, npm automatically fetches a malicious tarball from the C2. The tarball preinstall hook executes a 259-line payload that harvests developer emails from .gitconfig, .npmrc, and environment variables; collects CI/CD tokens from GitHub Actions, GitLab CI, Jenkins, and CircleCI; fingerprints the host system; and exfiltrates all data to http://npm.jpartifacts.com/jpd.php via redundant HTTP GET, POST, and WebSocket channels with no visible terminal output. The campaign was first disclosed by Koi Security in October 2025 (Wave 1) and extended across Waves 2-4 between November 2025 and February 2026. Full analysis: https://www.endorlabs.com/learn/return-of-phantomraven\n\nAny developer or CI/CD system that installed this package should be considered compromised. All secrets, tokens, and credentials accessible from that environment should be rotated immediately from a separate, unaffected machine.\n\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: amazon-inspector (1293b17080027d6e0ecdaeaa6711e46547d85691c2d8215ade57a6a472870f20)\nThe package require-in-package was found to contain malicious code.\n\n## Source: ghsa-malware (3268b9b7f0cfc4236262fc51a7d53987b2af93819a85ac969e6a58de41370b6b)\nAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.\n",
"id": "MAL-2026-1529",
"modified": "2026-04-28T04:47:58Z",
"published": "2026-03-16T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-5xq6-c5wc-f6x9"
},
{
"type": "ARTICLE",
"url": "https://www.endorlabs.com/learn/return-of-phantomraven"
},
{
"type": "ARTICLE",
"url": "https://www.koi.ai/blog/phantomraven-npm-malware-hidden-in-invisible-dependencies"
}
],
"schema_version": "1.7.4",
"summary": "Malicious code in require-in-package (npm)"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.