{"id":5900,"date":"2025-09-17T18:30:11","date_gmt":"2025-09-17T18:30:11","guid":{"rendered":"https:\/\/pokecon.jp\/job\/?p=5900"},"modified":"2025-09-17T18:30:11","modified_gmt":"2025-09-17T18:30:11","slug":"self-propagating-supply-chain-attack-hits-187-npm-packages","status":"publish","type":"post","link":"https:\/\/pokecon.jp\/job\/5900\/","title":{"rendered":"Self-propagating supply chain attack hits 187 npm packages"},"content":{"rendered":"\n<\/p>\n<div>\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" alt=\"npm\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2022\/07\/05\/NPM.jpg\" width=\"1600\"\/><\/p>\n<p>Security researchers have identified at least\u00a0187\u00a0npm packages compromised in an ongoing supply chain attack, with a malicious self-propagating payload to infect other packages.<\/p>\n<p>The coordinated worm-style campaign dubbed &#8216;Shai-Hulud&#8217; started yesterday with the compromise of the <em>@ctrl\/tinycolor<\/em> npm package, which receives over 2 million weekly downloads.<\/p>\n<p>Since then, the campaign has expanded significantly and now includes packages published under CrowdStrike&#8217;s npm namespace.<\/p>\n<h2>From <em>tinycolor<\/em> to CrowdStrike<\/h2>\n<p>Yesterday,\u00a0Daniel Pereira, a senior backend software engineer, <a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/posts\/daniel-pereira-b17a27160_npm-profile-activity-7373489836437114880-D9ma?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAArUYTQBMx2P2SMFdIx-wUs7H1hfLGpuhVM\" target=\"_blank\" rel=\"nofollow noopener\">alerted<\/a> the community to a large-scale software supply chain attack affecting the world&#8217;s largest JavaScript registry, npmjs.com.<\/p>\n<p>&#8220;There is a [sic] malware spreading live in npm as you read this,&#8221;\u00a0wrote the engineer, cautioning everyone to refrain from installing the latest versions of the <em><a target=\"_blank\" href=\"https:\/\/www.npmjs.com\/package\/@ctrl\/tinycolor\" target=\"_blank\" rel=\"nofollow noopener\">@ctrl\/tinycolor<\/a><\/em> project.<\/p>\n<div style=\"text-align:center\">\n<figure class=\"image\" style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" alt=\"Pereira's LinkedIn post alerting everyone to ongoing npm supply chain attack\" height=\"401\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1164866\/2025\/Sep\/npm-supply-chain-attack-crowdstrike\/dan-p-post.jpg\" width=\"500\"\/><figcaption><strong>Pereira alerting everyone to ongoing npm supply chain attack<\/strong><\/figcaption><\/figure>\n<\/div>\n<p>Pereira had\u00a0been\u00a0<a target=\"_blank\" href=\"http:\/\/linkedin.com\/feed\/update\/urn:li:activity:7373418115398995968\/\" target=\"_blank\" rel=\"nofollow noopener\">trying to<\/a> get GitHub&#8217;s attention in the last 24 hours through more discreet channels to discuss the ongoing attack as &#8220;a\u00a0lot of repos were targeted,&#8221; and disclosing the attack publicly could put people at risk.<\/p>\n<p>&#8220;But contacting GitHub is too hard. For instance, secrets are being exposed in repos. This is serious,&#8221; wrote the engineer.<\/p>\n<p>Software supply chain security firm Socket <a target=\"_blank\" href=\"https:\/\/socket.dev\/blog\/tinycolor-supply-chain-attack-affects-40-packages\" target=\"_blank\" rel=\"nofollow noopener\">began investigating the compromise<\/a> and identified at least 40 packages that were compromised in this\u00a0campaign. Today, both\u00a0Socket\u00a0and\u00a0Aikido\u00a0researchers have <a target=\"_blank\" href=\"http:\/\/www.aikido.dev\/blog\/s1ngularity-nx-attackers-strike-again#:~:text=publishing%20rights.-,Impacted%20packages,-Package\" target=\"_blank\" rel=\"nofollow noopener\">identified additional packages<\/a>, bringing the count up to at least 187.\u00a0<\/p>\n<p>StepSecurity <a target=\"_blank\" href=\"https:\/\/www.stepsecurity.io\/blog\/ctrl-tinycolor-and-40-npm-packages-compromised\" target=\"_blank\" rel=\"nofollow noopener\">also published<\/a> a technical breakdown with deobfuscated snippets and attack-flow diagrams, largely\u00a0confirming Socket&#8217;s initial findings.<\/p>\n<p>Affected\u00a0packages include several ones published by CrowdStrike&#8217;s npmjs account\u00a0<em><a target=\"_blank\" href=\"https:\/\/www.npmjs.com\/~crowdstrike-publisher\" target=\"_blank\" rel=\"nofollow noopener\">crowdstrike-publisher<\/a><\/em>.<\/p>\n<p>BleepingComputer reached out to the cybersecurity solutions provider for comment:<\/p>\n<p class=\"bc_quote\">&#8220;After detecting several malicious Node Package Manager (NPM) packages in the public NPM registry, a third-party open source repository, we swiftly removed them and proactively rotated our keys in public registries,&#8221; a CrowdStrike spokesperson shared with\u00a0BleepingComputer.<\/p>\n<p>&#8220;These packages are not used in the Falcon sensor, the platform is not impacted and customers remain protected. We are working with NPM and conducting a thorough investigation.&#8221;<\/p>\n<h2>Self-propagating worm uses\u00a0TruffleHog to steal secrets<\/h2>\n<p>The compromised versions include a self-propagating mechanism that targets other packages by the same maintainer.<\/p>\n<p>The malware downloads each package by a maintainer, modifies its <em>package.json<\/em>, injects a <em>bundle.js<\/em> script (shown below), repacks the archive, and republishes it, thereby &#8220;enabling automatic trojanization of downstream packages,&#8221;\u00a0as Socket researchers explained.<\/p>\n<div style=\"text-align:center\">\n<figure class=\"image\" style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" alt=\"bundle.js file uses TruffleHog to exfiltrate secrets \" height=\"270\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1164866\/2025\/Sep\/npm-supply-chain-attack-crowdstrike\/socket-bundle_js-file.jpg\" width=\"500\"\/><figcaption><strong>bundle.js file downloads TruffleHog to exfiltrate secrets<\/strong> (Socket)<\/figcaption><\/figure>\n<\/div>\n<p>The <em>bundle.js<\/em> script makes use of TruffleHog,\u00a0a legitimate secret scanner that can be used by\u00a0developers and security professionals to find accidentally leaked sensitive information like API keys, passwords, and tokens within code repositories and other data sources.<\/p>\n<p>The malicious script, however, abuses the tool to search the host for tokens and cloud credentials.<\/p>\n<p>&#8220;It validates and uses developer and CI credentials, creates a GitHub Actions workflow inside repositories, and exfiltrates results to a hardcoded webhook\u00a0(hxxps:\/\/webhook[.]site\/bb8ca5f6-4175-45d2-b042-fc9ebb8170b7),&#8221; explains Socket.<\/p>\n<p>The name &#8216;Shai-Hulud&#8217; comes from the <em>shai-hulud.yaml <\/em>workflow<em>\u00a0<\/em>files used by\u00a0malware found in the compromised versions, and is a reference to the\u00a0giant sandworms in Frank Herbert&#8217;s\u00a0<a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Sandworm_(Dune)\" target=\"_blank\" rel=\"nofollow noopener\"><em>Dune<\/em><\/a> series.<\/p>\n<p>&#8220;While not a unique reference, its presence reinforces that the attacker deliberately branded the campaign &#8216;Shai-Hulud,'&#8221; <a target=\"_blank\" href=\"https:\/\/socket.dev\/blog\/ongoing-supply-chain-attack-targets-crowdstrike-npm-packages\" target=\"_blank\" rel=\"nofollow noopener\">stated<\/a> Socket\u00a0researchers Kush Pandya and Peter van der Zee today.<\/p>\n<p>The malware found in additional packages identified today is identical to the previous strand that used <em>bundle.js<\/em> to:<\/p>\n<ul>\n<li>Download\u00a0and execute the legitimate secret scanning tool, TruffleHog<\/li>\n<p>&#13;<\/p>\n<li>Search the host for secrets like tokens and cloud credentials<\/li>\n<p>&#13;<\/p>\n<li>Check if\u00a0the discovered\u00a0developer and CI credentials are valid<\/li>\n<p>&#13;<\/p>\n<li>Create unauthorized GitHub Actions workflows within repositories<\/li>\n<p>&#13;<\/p>\n<li>Exfiltrate\u00a0sensitive data to a hardcoded webhook endpoint<\/li>\n<p>&#13;\n<\/ul>\n<h2>Incident\u00a0follows ongoing large-scale attacks like nx &#8216;s1ngularity&#8217;<\/h2>\n<p>What makes this supply-chain attack stand out, beyond the popular packages it hit, is its timing.<\/p>\n<p>The attack follows two high-profile supply chain attacks occurring in the same month.<\/p>\n<p>The first week of September, AI-powered malware <a target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ai-powered-malware-hit-2-180-github-accounts-in-s1ngularity-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">hit 2,180 GitHub accounts<\/a> in what was dubbed the &#8216;s1ngularity&#8217; attack.<\/p>\n<p>While the root cause of today&#8217;s attack is still being investigated, practitioners, including\u00a0Pereira, hypothesize that today&#8217;s attack may have been orchestrated by the attackers behind\u00a0&#8216;s1ngularity&#8217;.<\/p>\n<p>Earlier this month, maintainers of the popular <a target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-hijack-npm-packages-with-2-billion-weekly-downloads-in-supply-chain-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">chalk and debug npm packages<\/a>\u00a0also fell victim to phishing, in a separate attack, leading to their projects being\u00a0compromised.\u00a0<\/p>\n<p>The ripple effects of these attacks extend deep into the dependency chain, potentially impacting widely used projects such as Google Gemini CLI, which\u00a0<a target=\"_blank\" href=\"https:\/\/github.com\/google-gemini\/gemini-cli\/discussions\/8385\" target=\"_blank\" rel=\"nofollow noopener\">released a statement<\/a> over the weekend:<\/p>\n<p>&#8220;We want to be clear: The Gemini CLI source code itself was not compromised, and our servers remain secure,&#8221; wrote\u00a0Ryan J. Salva, Google&#8217;s Senior Director of Product Management.<\/p>\n<p>&#8220;However, this incident may have affected users who installed or updated the Gemini CLI during the attack window using the NPM installation method. We are providing details on the incident, clarifying who is impacted, and outlining the steps users should take to ensure their systems are secure.&#8221;<\/p>\n<p>These ongoing attacks demonstrate the fragility of\u00a0the modern software supply chain, where a single malicious pull request or compromised maintainer account can ripple out to hundreds of projects.<\/p>\n<p>While vendors like Google and CrowdStrike stress their core platforms remain secure, the incident underscores the urgent need for developers to safeguard their software builds and pipelines.<\/p>\n<p>Affected users should audit their environments and logs\u00a0for signs of compromise, rotate all secrets and CI\/CD tokens, and review dependency trees for malicious versions. Pinning dependencies to trusted releases and limiting the scope of publishing credentials remain critical steps to reduce exposure to package-level compromises.<\/p>\n<div class=\"ia_ad\">\n<div class=\"ia_lef\">\n        <a target=\"_blank\" href=\"https:\/\/hubs.li\/Q03B5Kw_0\" target=\"_blank\" rel=\"noopener sponsored\"><br \/>\n            <img decoding=\"async\" alt=\"Picus Blue Report 2025\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus\/blue-report-2025.jpg\" class=\"b-lazy\"\/><\/a>\n    <\/div>\n<div class=\"ia_rig\">\n<p>46% of environments had passwords cracked, nearly doubling from 25% last year.<\/p>\n<p>Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.<\/p>\n<p>        <button class=\"ia_button\"><a target=\"_blank\" href=\"https:\/\/hubs.li\/Q03B5Kw_0\" target=\"_blank\" rel=\"noopener sponsored\">Get the Blue Report 2025<\/a><\/button>\n    <\/div>\n<\/div><\/div>\n\n<br \/><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/\">\u5143\u306e\u8a18\u4e8b\u3092\u78ba\u8a8d\u3059\u308b <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Security researchers have identified at least\u00a0187\u00a0npm packages compromised in an ongoing supply chain attack,  [&hellip;]","protected":false},"author":1,"featured_media":5901,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2],"tags":[],"class_list":["post-5900","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hatena-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Self-propagating supply chain attack hits 187 npm packages - \u30dd\u30b1\u30b3\u30f3<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Self-propagating supply chain attack hits 187 npm packages - \u30dd\u30b1\u30b3\u30f3\" \/>\n<meta property=\"og:description\" content=\"Security researchers have identified at least\u00a0187\u00a0npm packages compromised in an ongoing supply chain attack, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/\" \/>\n<meta property=\"og:site_name\" content=\"\u30dd\u30b1\u30b3\u30f3\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-17T18:30:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pokecon.jp\/job\/wp-content\/uploads\/2025\/09\/NPM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"info@pokecon.jp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"info@pokecon.jp\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.bleepingcomputer.com\\\/news\\\/security\\\/self-propagating-supply-chain-attack-hits-187-npm-packages\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/5900\\\/\"},\"author\":{\"name\":\"info@pokecon.jp\",\"@id\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/#\\\/schema\\\/person\\\/16c9f07b1ba984d165d9aee259bda997\"},\"headline\":\"Self-propagating supply chain attack hits 187 npm packages\",\"datePublished\":\"2025-09-17T18:30:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/5900\\\/\"},\"wordCount\":983,\"image\":{\"@id\":\"https:\\\/\\\/www.bleepingcomputer.com\\\/news\\\/security\\\/self-propagating-supply-chain-attack-hits-187-npm-packages\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/NPM.jpg\",\"articleSection\":[\"\u306f\u3066\u306a\u30d6\u30ed\u30b0\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/5900\\\/\",\"url\":\"https:\\\/\\\/www.bleepingcomputer.com\\\/news\\\/security\\\/self-propagating-supply-chain-attack-hits-187-npm-packages\\\/\",\"name\":\"Self-propagating supply chain attack hits 187 npm packages - \u30dd\u30b1\u30b3\u30f3\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bleepingcomputer.com\\\/news\\\/security\\\/self-propagating-supply-chain-attack-hits-187-npm-packages\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bleepingcomputer.com\\\/news\\\/security\\\/self-propagating-supply-chain-attack-hits-187-npm-packages\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/NPM.jpg\",\"datePublished\":\"2025-09-17T18:30:11+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/#\\\/schema\\\/person\\\/16c9f07b1ba984d165d9aee259bda997\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bleepingcomputer.com\\\/news\\\/security\\\/self-propagating-supply-chain-attack-hits-187-npm-packages\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bleepingcomputer.com\\\/news\\\/security\\\/self-propagating-supply-chain-attack-hits-187-npm-packages\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/www.bleepingcomputer.com\\\/news\\\/security\\\/self-propagating-supply-chain-attack-hits-187-npm-packages\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/NPM.jpg\",\"contentUrl\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/NPM.jpg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bleepingcomputer.com\\\/news\\\/security\\\/self-propagating-supply-chain-attack-hits-187-npm-packages\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u30db\u30fc\u30e0\",\"item\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Self-propagating supply chain attack hits 187 npm packages\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/#website\",\"url\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/\",\"name\":\"\u30dd\u30b1\u30b3\u30f3\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/#\\\/schema\\\/person\\\/16c9f07b1ba984d165d9aee259bda997\",\"name\":\"info@pokecon.jp\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b0549cd9f7907c092ca5fbb283baf72337f235726e4b46fa39ec0b701ac2fe2?s=96&d=wavatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b0549cd9f7907c092ca5fbb283baf72337f235726e4b46fa39ec0b701ac2fe2?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b0549cd9f7907c092ca5fbb283baf72337f235726e4b46fa39ec0b701ac2fe2?s=96&d=wavatar&r=g\",\"caption\":\"info@pokecon.jp\"},\"url\":\"https:\\\/\\\/pokecon.jp\\\/job\\\/author\\\/infopokecon-jp\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Self-propagating supply chain attack hits 187 npm packages - \u30dd\u30b1\u30b3\u30f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/","og_locale":"ja_JP","og_type":"article","og_title":"Self-propagating supply chain attack hits 187 npm packages - \u30dd\u30b1\u30b3\u30f3","og_description":"Security researchers have identified at least\u00a0187\u00a0npm packages compromised in an ongoing supply chain attack, [&hellip;]","og_url":"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/","og_site_name":"\u30dd\u30b1\u30b3\u30f3","article_published_time":"2025-09-17T18:30:11+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/pokecon.jp\/job\/wp-content\/uploads\/2025\/09\/NPM.jpg","type":"image\/jpeg"}],"author":"info@pokecon.jp","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"info@pokecon.jp","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"5\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/#article","isPartOf":{"@id":"https:\/\/pokecon.jp\/job\/5900\/"},"author":{"name":"info@pokecon.jp","@id":"https:\/\/pokecon.jp\/job\/#\/schema\/person\/16c9f07b1ba984d165d9aee259bda997"},"headline":"Self-propagating supply chain attack hits 187 npm packages","datePublished":"2025-09-17T18:30:11+00:00","mainEntityOfPage":{"@id":"https:\/\/pokecon.jp\/job\/5900\/"},"wordCount":983,"image":{"@id":"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/#primaryimage"},"thumbnailUrl":"https:\/\/pokecon.jp\/job\/wp-content\/uploads\/2025\/09\/NPM.jpg","articleSection":["\u306f\u3066\u306a\u30d6\u30ed\u30b0"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/pokecon.jp\/job\/5900\/","url":"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/","name":"Self-propagating supply chain attack hits 187 npm packages - \u30dd\u30b1\u30b3\u30f3","isPartOf":{"@id":"https:\/\/pokecon.jp\/job\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/#primaryimage"},"image":{"@id":"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/#primaryimage"},"thumbnailUrl":"https:\/\/pokecon.jp\/job\/wp-content\/uploads\/2025\/09\/NPM.jpg","datePublished":"2025-09-17T18:30:11+00:00","author":{"@id":"https:\/\/pokecon.jp\/job\/#\/schema\/person\/16c9f07b1ba984d165d9aee259bda997"},"breadcrumb":{"@id":"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/#primaryimage","url":"https:\/\/pokecon.jp\/job\/wp-content\/uploads\/2025\/09\/NPM.jpg","contentUrl":"https:\/\/pokecon.jp\/job\/wp-content\/uploads\/2025\/09\/NPM.jpg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.bleepingcomputer.com\/news\/security\/self-propagating-supply-chain-attack-hits-187-npm-packages\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u30db\u30fc\u30e0","item":"https:\/\/pokecon.jp\/job\/"},{"@type":"ListItem","position":2,"name":"Self-propagating supply chain attack hits 187 npm packages"}]},{"@type":"WebSite","@id":"https:\/\/pokecon.jp\/job\/#website","url":"https:\/\/pokecon.jp\/job\/","name":"\u30dd\u30b1\u30b3\u30f3","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pokecon.jp\/job\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Person","@id":"https:\/\/pokecon.jp\/job\/#\/schema\/person\/16c9f07b1ba984d165d9aee259bda997","name":"info@pokecon.jp","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/secure.gravatar.com\/avatar\/2b0549cd9f7907c092ca5fbb283baf72337f235726e4b46fa39ec0b701ac2fe2?s=96&d=wavatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2b0549cd9f7907c092ca5fbb283baf72337f235726e4b46fa39ec0b701ac2fe2?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b0549cd9f7907c092ca5fbb283baf72337f235726e4b46fa39ec0b701ac2fe2?s=96&d=wavatar&r=g","caption":"info@pokecon.jp"},"url":"https:\/\/pokecon.jp\/job\/author\/infopokecon-jp\/"}]}},"_links":{"self":[{"href":"https:\/\/pokecon.jp\/job\/wp-json\/wp\/v2\/posts\/5900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pokecon.jp\/job\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pokecon.jp\/job\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pokecon.jp\/job\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pokecon.jp\/job\/wp-json\/wp\/v2\/comments?post=5900"}],"version-history":[{"count":1,"href":"https:\/\/pokecon.jp\/job\/wp-json\/wp\/v2\/posts\/5900\/revisions"}],"predecessor-version":[{"id":5902,"href":"https:\/\/pokecon.jp\/job\/wp-json\/wp\/v2\/posts\/5900\/revisions\/5902"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pokecon.jp\/job\/wp-json\/wp\/v2\/media\/5901"}],"wp:attachment":[{"href":"https:\/\/pokecon.jp\/job\/wp-json\/wp\/v2\/media?parent=5900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pokecon.jp\/job\/wp-json\/wp\/v2\/categories?post=5900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pokecon.jp\/job\/wp-json\/wp\/v2\/tags?post=5900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}