Snyk has reported that there have been attempts or successful attacks targeting this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsAvoid using all malicious instances of the is
package.
is is a malicious package. through obfuscated JS code in 'index.js'. A malicious actor compromised the credentials of one of the maintainers via a phishing attack; This allowed the attacker to publish tampered versions of the package to npm.
The malicious loader included in the package reconstructs a hidden script in memory, executes it, and then collects system information and environment variables. It establishes a WebSocket connection to a threat actor, sending collected data and executing arbitrary JavaScript received, effectively creating a remote shell and potentially persisting on the system if the process was created with write permissions.
Note:
The malware uses a persistence mechanism by overwriting index.js. To effectively remove it, users are recommended to both reset the lockfiles, and delete node_modules
to fully eliminate the infection.