mal-2026-3309
Vulnerability from ossf_malicious_packages
Published
2026-05-03 16:10
Modified
2026-05-04 10:37
Summary
Malicious code in google-cloud-secret-manager-config-poc (npm)
Details

Malicious npm package published by the microsop threat actor as part of a dependency-confusion campaign that impersonates internal tooling at Microsoft, Google Cloud, and PayPal using inflated semver values (e.g. 99.9.x, 100.1.x) to win npm resolution against private internal packages. All packages in the campaign falsely advertise themselves as "Security Research PoC" and execute on preinstall via node index.js, exfiltrating to disposable webhook.site endpoints.

This package targets Google-Cloud-flavored internal naming and performs SSH key validation/fingerprinting on the build host. On install it checks for /root/.ssh/id_rsa, runs ssh-keygen -l -f to extract the key fingerprint and ssh-keygen -y -f to derive the public key, then POSTs {hostname, fingerprint, public_key, key_exists} to https://webhook.site/813b99f6-c86c-4a1f-9318-518a3c153992 tagged status: KEY_VALIDATION_RESULT. The captured fingerprint and public key let the operator correlate the install host against authorized-keys lists for downstream lateral movement.


-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (daa2f2438668b4ed2d4a869c9cd52cc3e989b235e08652eb8a041db22c222ae2)

The OpenSSF Package Analysis project identified 'google-cloud-secret-manager-config-poc' @ 99.9.14 (npm) as malicious.

It is considered malicious because:

  • The package executes one or more commands associated with malicious behavior.

{
  "affected": [
    {
      "package": {
        "ecosystem": "npm",
        "name": "google-cloud-secret-manager-config-poc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            }
          ],
          "type": "SEMVER"
        }
      ],
      "versions": [
        "99.9.14"
      ]
    }
  ],
  "credits": [
    {
      "contact": [
        "https://github.com/ossf/package-analysis",
        "https://openssf.slack.com/channels/package_analysis"
      ],
      "name": "OpenSSF: Package Analysis",
      "type": "FINDER"
    },
    {
      "contact": [
        "https://safedep.io"
      ],
      "name": "SafeDep",
      "type": "FINDER"
    }
  ],
  "database_specific": {
    "malicious-packages-origins": [
      {
        "import_time": "2026-05-04T03:13:24.730000059Z",
        "modified_time": "2026-05-03T16:10:57Z",
        "sha256": "daa2f2438668b4ed2d4a869c9cd52cc3e989b235e08652eb8a041db22c222ae2",
        "source": "ossf-package-analysis",
        "versions": [
          "99.9.14"
        ]
      }
    ]
  },
  "details": "Malicious npm package published by the `microsop` threat actor as part of a dependency-confusion campaign that impersonates internal tooling at Microsoft, Google Cloud, and PayPal using inflated semver values (e.g. 99.9.x, 100.1.x) to win npm resolution against private internal packages. All packages in the campaign falsely advertise themselves as \"Security Research PoC\" and execute on `preinstall` via `node index.js`, exfiltrating to disposable `webhook.site` endpoints.\n\nThis package targets Google-Cloud-flavored internal naming and performs SSH key validation/fingerprinting on the build host. On install it checks for `/root/.ssh/id_rsa`, runs `ssh-keygen -l -f` to extract the key fingerprint and `ssh-keygen -y -f` to derive the public key, then POSTs `{hostname, fingerprint, public_key, key_exists}` to `https://webhook.site/813b99f6-c86c-4a1f-9318-518a3c153992` tagged `status: KEY_VALIDATION_RESULT`. The captured fingerprint and public key let the operator correlate the install host against authorized-keys lists for downstream lateral movement.\n\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: ossf-package-analysis (daa2f2438668b4ed2d4a869c9cd52cc3e989b235e08652eb8a041db22c222ae2)\nThe OpenSSF Package Analysis project identified \u0027google-cloud-secret-manager-config-poc\u0027 @ 99.9.14 (npm) as malicious.\n\nIt is considered malicious because:\n\n- The package executes one or more commands associated with malicious behavior.\n",
  "id": "MAL-2026-3309",
  "modified": "2026-05-04T10:37:22Z",
  "published": "2026-05-03T16:10:57Z",
  "schema_version": "1.7.4",
  "summary": "Malicious code in google-cloud-secret-manager-config-poc (npm)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…