node-ipc Hijacked via Expired Domain, Steals 90+ Credential Types
Attackers seized control of node-ipc by re-registering the maintainer's expired email domain. Three malicious versions now harvest AWS, GCP, Azure keys and more.
Three malicious versions of node-ipc, a foundational Node.js inter-process communication library with over 10 million weekly downloads, were published to npm on May 14, 2026. The packages contain an obfuscated credential stealer that harvests over 90 categories of secrets and exfiltrates them through multiple channels designed to evade detection.
The attack succeeded because the original maintainer's email domain expired. An attacker re-registered it through Namecheap on May 7, 2026, gaining password reset access to the npm account.
Affected Versions
The compromised packages are:
These were published by an account named "atiertant" that had no prior connection to the package's legitimate author, "riaevangelist." The last clean release was in August 2024—a 21-month gap that should have raised flags.
How the Attack Works
Unlike typical npm supply chain attacks that use lifecycle hooks (preinstall, install, postinstall), this payload appends an Immediately Invoked Function Expression (IIFE) to the end of node-ipc.cjs. The malware fires unconditionally on every require('node-ipc') call, bypassing installation-stage security scanners.
According to StepSecurity researchers, version 12.0.1 includes a SHA-256 fingerprint check comparing against hard-coded hash fragments. The package remains inert unless the primary module path matches the target value—suggesting the attackers had specific high-value projects in mind.
What Gets Stolen
The credential harvester targets approximately 90 credential categories:
- Cloud providers: AWS, Google Cloud Platform, Microsoft Azure credentials
- Infrastructure: SSH keys, Kubernetes tokens, Terraform state files
- Development tools: GitHub CLI configs, npm tokens, database passwords
- AI tooling: Claude AI and Kiro IDE settings
- System data: Shell history, environment variables
The stolen data undergoes GZIP compression before exfiltration.
Exfiltration Techniques
The malware uses two channels to extract data:
HTTPS POST: Direct transmission to sh.azurestaticprovider[.]net, a fake Azure domain designed to blend into legitimate traffic.
DNS TXT Records: Encoded archive chunks bypass corporate DNS security by first overriding local resolvers with Google Public DNS (8.8.8.8, 1.1.1.1), then directly querying the attacker's C2 server. Organizations monitoring only their own DNS infrastructure would miss this entirely.
The malware also forks into detached background child processes, continuing exfiltration even after the parent Node.js application terminates.
Immediate Actions
If you installed any affected version:
- Remove compromised packages:
npm uninstall node-ipcthen reinstall clean versions - Assume full compromise: Rotate all credentials and secrets on affected systems
- Audit npm publish permissions: Check if any packages you maintain used stolen tokens
- Review CI/CD logs: Look for unauthorized actions during the compromise window
- Block the C2 domain: Add
sh.azurestaticprovider[.]netto your blocklist - Check cloud audit logs: Review IAM actions for unauthorized access
Clean versions to install:
- For 9.x users:
npm install [email protected] - For 12.x users:
npm install [email protected]
The Bigger Picture
This attack mirrors the TanStack supply chain compromise we covered last week, where attackers also used expired domain re-registration to hijack maintainer accounts. The RubyGems GemStuffer campaign earlier this week used similar exfiltration techniques targeting developer credentials.
Package repositories have become prime targets. npm alone hosts over 2 million packages, many maintained by individuals without security resources. Email domain expiration represents a systemic weakness—maintainers often don't realize their identity can be stolen years after they stop actively maintaining a project.
Organizational Defenses
Beyond reactive response, consider:
- Lock dependency versions: Use exact versions in package.json rather than ranges
- Monitor for unexpected updates: Alert when dependencies publish after long dormancy
- Verify maintainer continuity: Check if maintainer accounts or emails changed recently
- Network-level monitoring: The DNS exfiltration technique bypasses endpoint detection
- Supply chain security tools: Solutions like Socket, Snyk, and Semgrep can detect behavioral anomalies
For teams building with JavaScript, this is a reminder that your dependencies are part of your attack surface. The node-ipc attack analysis from Socket provides additional IOCs and detection guidance.
Related Articles
Bitwarden CLI Compromised in Shai-Hulud Supply Chain Attack
A malicious npm package hijacked Bitwarden CLI's publishing pipeline on April 22, harvesting credentials from 334 developers. Here's what happened.
Apr 25, 2026Axios npm Hijack Drops Cross-Platform RAT on 100M+ Installs
Attackers compromised the Axios npm package to deploy a cross-platform RAT targeting Windows, macOS, and Linux. Here's what happened and what you need to do.
Mar 31, 2026SAP npm Packages Backdoored in TeamPCP Supply Chain Attack
Four official SAP CAP ecosystem packages compromised on April 29, harvesting developer credentials, cloud secrets, and CI/CD tokens through malicious preinstall scripts.
May 1, 202636 Fake Strapi Plugins Deploy Redis RCE and Credential Stealers
Coordinated npm supply chain attack deploys 36 malicious packages masquerading as Strapi CMS plugins. Attackers target cryptocurrency platforms with Redis exploitation, credential harvesting, and persistent backdoors.
Apr 7, 2026