Malicious Packages Alert: The Qix npm Supply-Chain Attack: Lessons for the Ecosystem

The npm ecosystem is in the middle of a major supply-chain compromise. The maintainer known as Qix is currently targeted in a phishing campaign that allows attackers to bypass two-factor authentication and take over their npm account. This is happening right now, and malicious versions of widely used libraries are being published and distributed.

Attack Vector

The attack initiates with a phishing email impersonating npm support. The address-forged npm support email deceives Qix into resetting two-factor authentication, handing full control of the account to the adversary. Once inside, the attackers publish compromised versions of foundational JavaScript packages, including chalk, strip-ansi, and debug. These dependencies are downloaded over 2 billion times each week and sit at the base of countless dependency trees. One successful phishing campaign against a single package maintainer is sufficient to compromise the integrity of the software supply chain, likely introducing malicious code that propagates throughout widespread downstream dependencies.

Compromised Packages

  • backslash@0.2.1
  • chalk@5.6.1
  • chalk-template@1.1.1
  • color-convert@3.1.1
  • color-name@2.0.1
  • color-string@2.1.1
  • wrap-ansi@9.0.1
  • supports-hyperlinks@4.1.1
  • strip-ansi@7.1.1
  • slice-ansi@7.1.1
  • simple-swizzle@0.2.3
  • is-arrayish@0.3.3
  • error-ex@1.3.3
  • has-ansi@6.0.1
  • ansi-regex@6.2.1
  • ansi-styles@6.2.2
  • supports-color@10.2.1
  • debug@4.4.2
  • proto-tinker-wc@1.8.7

Malicious Payload

The injected code is designed to intercept and manipulate cryptocurrency transactions. By replacing transaction details with attacker-controlled values, the payload silently redirects funds. The goal is straightforward financial theft, but the delivery method, through trusted packages used everywhere, gives it reach and persistence that traditional malware campaigns rarely achieve.

Community Response

The developer community is actively surfacing and discussing the issue across GitHub, Hacker News, and research channels like vx-underground. Security research groups, including Socket, Aikido, and others, are analyzing the compromised releases in real time and advising developers on how to respond. The response demonstrates the open-source community’s resilience, but it also shows how quickly trust can be exploited when attackers move at this scale.

Immediate Steps for Developers and Security Teams

If you maintain or deploy applications that rely on npm:

  • Do not upgrade to the compromised package versions. Stick to earlier, verified stable releases.
  • Audit dependency trees immediately with tools like npm ls and confirm that malicious versions are not present in your node_modules directories.
  • Check lock files (package-lock.json or yarn.lock) to ensure your builds are pinned to safe versions and haven’t silently pulled in tainted updates.
  • Review CI/CD pipelines for any automated upgrades that may have ingested malicious releases.
  • Monitor systems for unexpected network activity or anomalous behavior if compromised packages have been deployed.

The situation is active. Every build and every deployment using npm packages needs scrutiny until the ecosystem regains stability.

Lessons for the Ecosystem

The Qix compromise shows that two-factor authentication is not a silver bullet when phishing remains effective. The human layer of the supply chain is just as exploitable as the code itself. Package ecosystems need to adopt phishing-resistant authentication such as hardware keys, stronger verification workflows for critical maintainers, and anomaly detection for package publishing. Without these safeguards, the compromise of one individual will continue to ripple into systemic risk for millions of applications.

Conclusion

The npm ecosystem is still responding to this incident, and the full blast radius is not yet known. What is clear is that the global software supply chain remains highly vulnerable when trust in individual maintainers can be turned against the entire community.

References

  • Aikido Security. (2025, September). Analysis of the Qix npm compromise. Retrieved from https://aikido.dev/blog/qix-npm-compromise
  • Latio Security. (2025, September). The Qix supply chain attack. Retrieved from https://www.latio.com/blog/qix-supply-chain-attack
  • Socket.dev. (2025, September). npm author Qix compromised in major supply chain attack. Retrieved from https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack
  • GitHub. (2025, September). Issue: Qix npm account compromised, malicious versions published. Retrieved from https://github.com/chalk/chalk/issues/xyz
  • Hacker News. (2025, September). Discussion: npm maintainer Qix compromised, malicious versions pushed. Retrieved from https://news.ycombinator.com/item?id=xyz
  • vx-underground. (2025, September). Coverage of npm Qix maintainer compromise. Retrieved from https://vx-underground.org
Table of contents

Related blogs

CVE-2026-21858: Ni8mare: Unauthenticated Remote Code Execution in n8n

An unauthenticated Remote Code Execution (RCE) flaw, tracked as CVE-2026-21858 (CVSS 10.0), has been discovered in n8n, the widely-adopted workflow automation platform. With over 100 million Docker pulls and an estimated 100,000 locally deployed instances, this vulnerability transforms n8n from a productivity tool into a severe single point of potential failure for organizations globally.

January 8, 2026

Guess Who's Back: Shai-Hulud 3.0 The Golden Path

Security analysts recently identified a new variant of the Shai-Hulud npm supply chain worm in the public registry, signaling continued evolution of this threat family. This variant, dubbed “The Golden Path” exhibits modifications from prior waves of the malware, suggesting ongoing evolution in the threat actor’s tradecraft.

December 29, 2025

Kai at Work: A Day in the Life of an AI AppSec Engineer

Kai, Kodem’s secure-by-design AI AppSec Engineer, is integrated directly into the platform to deliver contextualized and actionable answers precisely when AppSec teams need them. By converting your existing security data into conversational intelligence, Kai eliminates the need for hours of manual investigation and context-switching. You can now ask questions as you would to a senior, humble, and tireless engineer.

December 15, 2025

Stop the waste.
Protect your environment with Kodem.

Get a personalized demo
Get a personalized demo

A Primer on Runtime Intelligence

See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

Platform Overview Video

Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

The State of the Application Security Workflow

This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.

Get real-time insights across the full stack…code, containers, OS, and memory

Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Stay up-to-date on Audit Nexus

A curated resource for the many updates to cybersecurity and AI risk regulations, frameworks, and standards.

Kodem Security Research Team
Publish date

0 min read

Vulnerabilities