Malicious Code Diges 72

Xygeni Malicious Code Digest 72

Every week, our malware detection systems scan thousands of new and updated packages across public registries like npm and PyPI.

This week was especially active.

We confirmed 93  malicious packages, primarily across npm, with additional cases in PyPI, OpenVSX, and Composer. Several appeared in coordinated clusters, with repeated malicious releases published under the same names or across closely related package families. Many mimicked payment and checkout modules, enterprise and internal web packages, analytics clients, UI foundations, developer utilities, component explorers, cloud- and Google-themed packages, and other modules commonly trusted in modern development workflows.

These were not isolated anomalies. What stood out this week was the scale of repeated publishing across the same package families, the reuse of naming patterns, and the way malicious packages were disguised to look like legitimate dependencies inside real software delivery pipelines.

This weekly snapshot is part of our ongoing Malicious Code Digest, where we validate new threats and provide actionable intelligence to help DevSecOps teams protect their pipelines before damage occurs.

Let’s break down what we found this week and why it matters.

Ecosystem Package Date
npmpa-marked:99.1.10Apr 27, 2026
pypimoonbit-locale-compat:0.2.3Apr 27, 2026
npm@alfa.life.mapp/app.web:99.0.13Apr 27, 2026
npm@sbt_gitverse/analytics-client:99.0.1Apr 27, 2026
npm@frengki0707/google-cloud-clone:1.33.1Apr 27, 2026
npm@alfa.life.mapp/app.web:99.0.14Apr 27, 2026
npm@tochka-ui/foundation:99.0.2Apr 27, 2026
openvsxarcane-spark/ubel:0.1.0Apr 28, 2026
npm@2011-08-19/n:99.9.9Apr 28, 2026
npm@frengki0707/google-cloud-clone:1.38.0Apr 27, 2026
npm@frengki0707/google-cloud-clone:1.38.1Apr 27, 2026
npm@frengki0707/google-cloud-clone:1.39.0Apr 27, 2026
npm@frengki0707/google-cloud-clone:1.43.0Apr 27, 2026
npm@frengki0707/google-cloud-clone:1.44.0Apr 27, 2026
npmgoogle-logging-utils-internal:9.9.9Apr 27, 2026
npmgoogle-logging-utils-internal:1.1.4Apr 27, 2026
npm@combinezone/theme:99.9.10Apr 28, 2026
npmmaninos:1.3.0Apr 28, 2026
npm@inheritdoc/n:99.9.9Apr 28, 2026
npm@mts-pay/web-sdk:99.9.9Apr 28, 2026
npm@cashback/how-it-works-widget:99.9.9Apr 28, 2026
npm@cashback/postal-premium:99.9.9Apr 28, 2026
npm@toprimitive/nif:99.9.9Apr 28, 2026
npm@tostringtag/nsettostringtag:99.9.9Apr 28, 2026
npmrtms-manager:1.4.0Apr 28, 2026
npmvscode-component-explorer:99.9.15Apr 28, 2026
npmjs-component-explorer:99.9.16Apr 27, 2026
npmjs-component-explorer:99.9.17Apr 27, 2026
npm@alfa.life.mapp/app.web:99.0.15Apr 27, 2026
npm@tochka-ui/foundation:99.0.3Apr 27, 2026
npm@alfa.life.mapp/app.web:99.0.16Apr 27, 2026
npm@sbt_gitverse/analytics-client:99.0.4Apr 27, 2026
npm@tochka-ui/foundation:99.0.4Apr 27, 2026
npmkl-b2c-ui-kit:99.0.1Apr 27, 2026
composerdot-env-it/laravel-core-helper:v1.0.0Apr 28, 2026
npmuipath-ui-widgets:1.0.1Apr 28, 2026
npmstandalone-apps:1.0.1Apr 28, 2026
npm@tw-utils/static:99.0.1Apr 27, 2026
npm@tw-models/storage:99.0.1Apr 27, 2026
npm@tw-marionette/clipboard:99.0.1Apr 27, 2026
npm@tw-marionette/input:99.0.1Apr 27, 2026
npmapollo-landing:1.0.1Apr 28, 2026
npmprocess-app-task:1.0.1Apr 28, 2026
npmapollo-vertex:1.0.1Apr 28, 2026
npm@ozon-complt/split:99.0.1Apr 27, 2026
npm@apple-pay-trust/destroy:99.0.1Apr 27, 2026
npm@apple-pay-trust/merchant-session:99.0.1Apr 27, 2026
npm@apple-pay-trust/start:99.0.1Apr 27, 2026
npm@google-pay-trust/finish:99.0.1Apr 27, 2026
npm@apple-pay-trust/finish:99.0.1Apr 27, 2026
npm@apple-pay-trust/validate-merchant:99.0.1Apr 27, 2026
npm@alfa.life.mapp/app.web:99.0.17Apr 27, 2026
npm@zirutan/utils:1.0.2Apr 27, 2026
npm@zirutan/utils:1.0.4Apr 27, 2026
npmreport-ng:1.0.2Apr 27, 2026
npmkl-b2c-ui-kit:99.0.2Apr 27, 2026
npm@apple-pay-trust/authorize-payment:99.0.2Apr 27, 2026
npm@google-pay-trust/authorize-payment:99.0.2Apr 27, 2026
npm@ozon-complt/antibot-handler:99.0.2Apr 27, 2026
npm@sbt_gitverse/analytics-client:99.0.5Apr 27, 2026
npm@tw-models/storage:99.0.2Apr 27, 2026
npmfrank-bot-gogle-cloning:1.1.0Apr 27, 2026
npmfrank-research-poc-apple:1.1.4Apr 27, 2026
npm@google-pay-trust/init-google-pay-result:99.0.2Apr 27, 2026
npm@google-pay-trust/start:99.0.2Apr 27, 2026
npm@b2b_blocker/show_activation_error:99.0.2Apr 27, 2026
npm@business_promocode/cancel_promocode:99.0.2Apr 27, 2026
npm@business_promocode/apply_promocode:99.0.2Apr 27, 2026
npm@b2b_blocker/hide_activation_error:99.0.2Apr 27, 2026
npmapple-internal-pki-utils:1.0.1Apr 27, 2026
npmapple-internal-pki-trust-v5:1.0.0Apr 27, 2026
npm@taxmoninor/taxmon:99.0.6Apr 28, 2026
npm@alfa.life.mapp/app.web:99.0.19Apr 28, 2026
npm@apiary-annex/meta:99.0.4Apr 28, 2026
npm@apple-pay-trust/cancelled:99.0.3Apr 28, 2026
npm@apple-pay-trust/check-apple-pay:99.0.3Apr 28, 2026
npm@apple-pay-trust/check-apple-pay:99.0.4Apr 28, 2026
npm@apple-pay-trust/finish:99.0.3Apr 28, 2026
npm@apple-pay-trust/merchant-session:99.0.4Apr 28, 2026
npm@apple-pay-trust/merchant-session:99.0.3Apr 28, 2026
npm@apple-pay-trust/finish:99.0.4Apr 28, 2026
npm@apple-pay-trust/destroy:99.0.4Apr 28, 2026
npm@apple-pay-trust/destroy:99.0.3Apr 28, 2026
npm@pyme-web/web-api:99.0.4Apr 28, 2026
npm@google-pay-trust/authorize-payment:99.0.4Apr 28, 2026
npm@google-pay-trust/finish:99.0.3Apr 28, 2026
npm@google-pay-trust/init-google-pay:99.0.4Apr 28, 2026
npm@google-pay-trust/start:99.0.4Apr 28, 2026
npmkl-b2c-ui-kit:99.0.3Apr 28, 2026
npm@ozon-complt/antibot-handler:99.0.3Apr 28, 2026
npm@ozon-complt/antibot-handler:99.0.4Apr 28, 2026
npm@tw-models/storage:99.0.3Apr 28, 2026
npm@w3m-app/is_connected:99.0.4Apr 28, 2026
npm@w3m-frame/session_update:99.0.4Apr 28, 2026
npmaccesso-angular-cache-buster:99.9.0Apr 29, 2026
npmaccesso-angular-cache-buster:99.0.0Apr 29, 2026
npmhpsetup:2.0.0Apr 29, 2026

Secure Your Open Source Dependencies against Vulnerabilities and Malicious Code

Minimize risks and protect your applications from malicious packages with Xygeni Early Malware Detection. Prioritize and address the vulnerabilities that matter most. Our comprehensive solution offers real-time monitoring of your dependencies to detect and mitigate threats before they impact your software.

Managing open-source components in the current software development landscape is crucial due to the rising vulnerabilities and malicious code threats. Xygeni’s Open Source Security solution scans and blocks harmful packages upon publication, dramatically minimizing the risk of malware and vulnerabilities infiltrating your systems. Our comprehensive monitoring spans multiple public registries, ensuring all dependencies are scrutinized for safety and integrity. Xygeni enhances your team’s ability to maintain secure and reliable software projects by contextually prioritizing critical issues and facilitating streamlined remediation processes.

Xygeni uses multi-layered techniques to stop malicious code before it spreads. First of all, static code analysis detects obfuscation patterns, hidden payloads, and script abuse. In addition, behavioral sandboxing analyzes install hooks, runtime commands, and persistence tricks. Moreover, machine learning detection identifies zero-day npm malware and pypi malware variants missed by signature scanners. Finally, the Early Warning System monitors public repositories in real time, validates findings, and alerts DevOps teams immediately.

As a result, this combination ensures developers receive fast, actionable intelligence integrated directly into CI/CD workflows.

Why Developers Should Care About Malicious npm Packages

Modern threats rarely wait for runtime. For example, malicious npm packages often execute during installation, while pypi malicious packages hide token exfiltration or backdoors. Attackers:

  • Flip private GitHub repos to public to replicate them.
  • Exfiltrate credentials and secrets using encoded payloads.
  • Use obfuscated JavaScript loaders to deploy ransomware or botnets.

In fact, malicious open-source packages surged 156% in one year. Therefore, teams that rely only on delayed feeds or basic scanners fall behind.

What This Malware Report Tracks in npm and PyPI

This digest is the central hub for:

  • Confirmed malicious npm packages
  • Confirmed pypi malicious packages
  • Behavior-based detections of malicious code
  • Registry-confirmed incidents
  • Weekly and monthly malware report summaries
  • Historical changelog of all npm malware and pypi malware findings

In other words, it provides a single point of reference. The research team at Xygeni updates this page weekly with links to full technical analyses and GitHub IOCs.

How to Protect Against Malicious npm Packages and PyPI Malware

Because of this growing risk, organizations need strong defenses:

  • Enforce lockfile-only installs (npm ci) in CI/CD.
  • Additionally, scan dependencies pre-install with Xygeni’s Early Warning Engine.
  • Furthermore, block builds on malicious code signals using Guardrails.
  • Generate SBOMs to trace indirect dependencies and apply policies.
  • Above all, train developers to detect typosquatting, obfuscation, and suspicious install scripts.

Try Xygeni’s Malware Detection Tools

Xygeni delivers:

  • Real-time detection of malicious code, including backdoors, spyware, and ransomware.
  • In contrast to basic scanners, analysis across npm, PyPI, Maven, NuGet, RubyGems, and more.
  • Automatic build blocking when the malware report identifies risk.
  • Exploitability insights, maintainer reputation checks, and anomaly detection.
sca-tools-software-composition-analysis-tools
Prioritize, remediate, and secure your software risks
7-day free trial
No credit card required

Secure your Software Development and Delivery

with Xygeni Product Suite