A recent discovery by researchers has unveiled a malicious malware campaign targeting the npm ecosystem, infecting unsuspecting victims with the Skuld info stealer through deceptive packages masquerading as legitimate tools. The threat actor behind this nefarious scheme, known as “k303903,” managed to compromise numerous machines before the malicious packages were removed.
Further investigation into the matter has revealed that “k303903” likely operates under multiple aliases, including “shegotit2” and “pressurized,” all of whom employ similar tactics, techniques, and procedures (TTPs) to infiltrate the npm ecosystem with malware. These consistent attacks highlight the ongoing threat of supply chain vulnerabilities and emphasize the critical need for enhanced security measures within the development community.
The recent malware campaign aimed at npm developers delivered the Skuld infostealer, marking the second attack of its kind in just two months. This incident closely mirrors a prior assault on Roblox developers, demonstrating the flexibility and adaptability of the attackers in their malicious endeavors.
The threat actors employed a combination of typosquatting and obfuscation techniques to compromise development machines and extract sensitive data, showcasing a recurring pattern where attackers quickly pivot their strategies post initial success. This adaptability allows them to reintroduce threats with new packaging and distribution methods, evading traditional detection measures.
The malicious campaign in December 2024 utilized common deployment tactics and relied on readily available malware, underscoring the habitual use of deceptive practices by these threat actors. A closer look at the code snippet reveals a malicious download and execution process that leveraged various libraries to obtain and execute a malicious binary from a disguised URL. The use of obfuscation tools further complicates detection efforts, making it challenging to identify and mitigate the threat.
Actor k303903 leveraged typosquatting techniques to upload malicious npm packages that closely resembled popular libraries, tricking developers into unwittingly installing them. This allowed for data exfiltration via a Discord webhook and the establishment of command and control capabilities. By utilizing legitimate-looking commands and trusted services, the threat actor further obscured their malicious intent, underscoring the importance of vigilant package review practices prior to installation.
Despite the swift removal of the malicious npm packages from the registry after being downloaded over 600 times, the impact of the attack was substantial. The incident, reminiscent of a previous attack in November 2024, highlights the rapid evolution of threat actors who recycle malware like Skuld and refine their deceptive techniques.
In response to such threats, developers are advised to adopt a layered security approach and leverage automated tools to proactively scan for and block malicious dependencies during the development lifecycle. This proactive measure can help intercept potential threats before they have the chance to compromise critical systems and networks.
As the threat landscape continues to evolve, it is essential for organizations and developers to remain vigilant and implement robust security measures to safeguard against supply chain attacks and other malicious activities. By staying informed and proactive, the development community can better protect themselves and their systems from emerging threats.

