Malicious Package Affecting plain-crypto-js package, versions *


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Social Trends
Exploit Maturity
Attacked

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-PLAINCRYPTOJS-15850652
  • published31 Mar 2026
  • disclosed31 Mar 2026
  • creditUnknown

Introduced: 31 Mar 2026

New Malicious CVE NOT AVAILABLE CWE-506  (opens in a new tab)

How to fix?

Avoid using all malicious instances of the plain-crypto-js package.

Overview

plain-crypto-js is a malicious package. This package contains malicious code, and its content was removed from the official package manager. While this package might be attempting to impersonate a valid organization, there is no connection between that organization and the author of this package.

Notes

This package is involved in the compromise of the axios package;

RAT Behavior

The package executes an obfuscated postinstall script setup.js that establishes communication with an external command-and-control server (sfrclak.com:8000). The RAT checks the operating system and drops platform-specific payloads:

  • macOS: Drops a binary to /Library/Caches/com.apple.act.mond.
  • Windows: Drops a persistent executable to %PROGRAMDATA%\wt.exe and runs a PowerShell script.
  • Linux: Executes a Python script saved to /tmp/ld.py.

After execution, the malware deletes its setup.js script and replaces its own package.json with a clean stub to actively conceal evidence of the attack from post-infection inspection. If you find any of these persistent files or the node_modules/plain-crypto-js directory, you have been compromised and should no longer trust the system to be safe.

CVSS Base Scores

version 4.0
version 3.1