Security5 min readThe Hacker News

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

P
Redakcja Pixelift0 views
Share
36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

Foto: The Hacker News

Thirty-six malicious packages detected in the npm repository utilized popular database systems, such as Redis and PostgreSQL, to install persistent implants within victim infrastructure. According to a report by Zscaler ThreatLabz, cybercriminals are increasingly targeting the Open Source ecosystem, automating the infection process and reducing the time required to seize control of a system to nearly zero. The exploitation of trusted database tools allows attackers to bypass traditional security measures and establish remote access, which becomes the fastest path to a full organizational data breach. For users and developers worldwide, this necessitates a radical shift in the approach to dependency management in software projects. Traditional verification methods are failing to keep pace with AI-supported attacks, which have drastically shortened the so-called "human response window." Practical protection now requires the implementation of rigorous sandboxing during package installation and constant monitoring of unusual outgoing connections from database servers. Any unverified library can become a hidden backdoor, turning a standard application build process into a direct threat to the integrity of the entire corporate network. Effective defense is moving toward a total lack of trust in external code, forcing DevOps teams to employ advanced tools for real-time behavioral analysis.

In the open-source ecosystem, trust is a currency that is increasingly being forged. The latest discovery by cybersecurity researchers sheds light on a sophisticated campaign targeting developers using the npm package manager. 36 malicious packages have been identified, posing as legitimate plugins for the popular content management system Strapi CMS. This attack was not merely an attempt to steal browser data, but a precisely designed operation aimed at taking over database infrastructure and establishing a permanent presence in victims' systems.

What sets this campaign apart is its direct hit on critical backend components such as Redis and PostgreSQL. Attackers utilized installation automation mechanisms to deploy so-called reverse shells and persistent implants without the user's knowledge. The scale and precision of this attack demonstrate that the line between a secure development environment and infected production infrastructure is becoming dangerously thin.

Anatomy of an infection hidden in installation files

Each of the 36 detected packages was characterized by an almost identical, minimalistic structure, aimed at avoiding detection by simple antivirus scanners. The archives contained only three key files: package.json, index.js, and postinstall.js. The lack of descriptions in the repository, no links to official code sources, and the absence of documentation should have been warning signs; however, in the haste of development work, these details often escape notice.

The key element of the attack was the postinstall.js file. This script runs automatically immediately after the package is downloaded via the npm install command. It is at this moment that the malicious payload was initiated, checking the system configuration and attempting to establish a connection with PostgreSQL and Redis databases. Instead of waiting for the developer to run the application, the code attacked the system during the environment building stage.

npm package attack diagram
The identified packages utilized the post-install mechanism to infect Redis and PostgreSQL databases.

The use of Strapi CMS as a cover was not accidental. Strapi is one of the fastest-growing headless CMS systems, used by thousands of companies to manage content via API. Developers looking for extensions for this system often operate with administrative privileges, providing attackers with an ideal opportunity for privilege escalation and credential harvesting directly from server configuration files.

Database exploitation and persistent implants

The attack was not limited to a one-time code execution. The main goal was to embed a persistent implant in the system, allowing for remote access to the server even after a machine restart or the removal of the malicious npm package. By exploiting vulnerabilities or weak configurations in Redis and PostgreSQL, attackers could modify database tables or inject their own authorization keys.

  • Redis Exploitation: Using configuration commands to overwrite system files or add SSH keys to authorized users.
  • PostgreSQL Attacks: Attempts to steal authentication data and utilize system functions to run external shell scripts.
  • Reverse Shell: Establishing a back-connection to a Command & Control (C2) server, giving hackers full control over the victim's terminal.
  • Persistence: Modifying system startup scripts to ensure the malicious process runs with every server boot.

This phenomenon fits into a broader trend described in the Zscaler ThreatLabz 2026 VPN Risk Report. According to the report, traditional remote access methods are becoming the fastest path to a security breach. In the era of distributed work, where developers connect to corporate infrastructure from various locations, an infected package on a developer's local machine becomes a Trojan horse inside the corporate VPN.

Software supply chain threats
Threat analysis indicates the growing role of malicious software hidden in open-source repositories.

The role of AI in shortening attack response time

Modern cyber threats are evolving at a pace that human operators cannot match without technological support. As noted by the authors of the Zscaler report, artificial intelligence (AI) has drastically shortened the "human response window." Attackers are increasingly using automated tools to generate malicious code and mass-publish packages in repositories such as npm or PyPI.

"AI collapsed human response window and turned remote access into fastest path to breach."

This paradigm shift means that traditional manual verification methods are insufficient. Malicious packages can appear, infect hundreds of systems, and be removed from the registry before any analyst has time to examine them. In the case of the 36 packages described, their structure was repetitive enough to suggest the use of scripts for mass generation, allowing the npm registry to be quickly "flooded" with fake Strapi plugins.

The key challenge for organizations thus becomes implementing a Zero Trust strategy not only for network access but also for software dependency management. Every external package downloaded should be treated as a potential threat, and CI/CD processes must include sandboxing stages where installation scripts are monitored for unauthorized network connection attempts or system file modifications.

A new era of supply chain threats

The incident with packages impersonating Strapi CMS components is a clear warning that supply chain attacks are becoming increasingly targeted. Attackers are no longer just looking for random victims but are targeting specific technology stacks, knowing that taking over a Redis or PostgreSQL server gives them access to the most valuable asset of modern business: data.

Developers must abandon the belief that official package registries are fully secure zones. It is necessary to use Software Composition Analysis (SCA) tools, block the automatic execution of post-install scripts, and rigorously verify library authors. In a world where AI accelerates offensive actions, defense must rely on security automation and deep visibility into processes occurring within development environments. Without these steps, the next wave of malicious implants may prove undetectable until data begins leaking from databases on a massive scale.

Comments

Loading...