Three npm Packages Opened Remote-Access Shells on Linux and Windows Systems Slashdot
https://nu.federati.net/url/276724

>"Three JavaScript packages have been removed from the npm portal on Thursday for containing malicious code," reports ZDNet.
>
>"According to advisories from the npm security team, the three JavaScript libraries opened shells on the computers of developers who imported the packages into their projects."
>The shells, a technical term used by cyber-security researchers, allowed threat actors to connect remotely to the infected computer and execute malicious operations. The npm security team said the shells could work on both Windows and *nix operating systems, such as Linux, FreeBSD, OpenBSD, and others.
>
>All three packages were uploaded on the npm portal in May (first) and September 2018 (last two). Each package had hundreds of downloads since being uploaded on the npm portal. The packages names were:
>
>plutov-slack-client
>nodetest199
>nodetest1010
>
>"Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer," the npm security team said.

Related Links:
Three npm packages found opening shells on Linux, Windows systems ZDNet
https://www.zdnet.com/article/three-npm-packages-found-opening-shells-on-linux-windows-systems/

npm
https://www.npmjs.com/advisories/1570