
Malicious Code Found In AntV Packages
TL;DR: Microsoft has uncovered a supply chain attack targeting the @antv npm ecosystem. Attackers compromised a maintainer's account to publish malicious versions of data-visualization packages. The code aims to steal credentials from CI/CD pipelines and affects widely used libraries like echarts-for-react.
Key facts
- Category
- Cybersecurity
- Impact
- Low
- Published
- Source
- Microsoft Security
Full summary
A supply chain attack has compromised popular @antv npm packages, aiming to steal credentials from developer CI/CD pipelines and cloud environments.
Microsoft's security team has identified an active supply chain attack within the npm package ecosystem, specifically targeting packages under the @antv scope. According to their investigation, a threat actor gained access to an @antv package maintainer's account. Using this access, the attacker published malicious versions of several widely used data-visualization libraries. The malicious code was concealed within a large, heavily obfuscated JavaScript file of approximately 499 KB, which was designed to execute silently in the background. This method allowed the malicious payload to go unnoticed while being integrated into various development projects.
The primary danger of this attack lies in its propagation through the software supply chain. Because the compromised @antv packages are dependencies for other popular libraries, the malicious code spread to a vast number of downstream projects. One notable example is the `echarts-for-react` package, which records over one million weekly downloads. By infecting such a popular library, the attackers significantly widened their reach. The ultimate goal of the malware is to compromise continuous integration and continuous delivery (CI/CD) pipelines and cloud environments. It actively seeks to steal credentials and other sensitive information, posing a serious risk to any organization whose development workflows rely on the affected packages.
Why it matters
This supply chain attack affects a widely used ecosystem, potentially exposing sensitive CI/CD credentials in thousands of downstream projects.
Business impact
Compromised developer tools can lead to stolen cloud credentials, data breaches, and unauthorized access to critical infrastructure, posing a significant financial and reputational risk.
⚡ Action needed
Immediate action is required to check for and remove malicious package versions.
Action checklist
- 1Audit your project dependencies for any @antv packages.
- 2Check for malicious versions of packages like `echarts-for-react`.
- 3Update to a known safe version or remove the dependency if possible.
- 4Scan CI/CD environments for signs of compromise.
- 5Rotate any credentials or secrets exposed in your build pipelines.
Tags
Primary source: Microsoft Security